Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-31129
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.222Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" }, { "tags": [ "x_transferred" ], "url": "https://github.com/moment/moment/pull/6015#issuecomment-1152961973" }, { "tags": [ "x_transferred" ], "url": "https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3" }, { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/" }, { "name": "FEDORA-2022-85aa8e5706", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/" }, { "name": "FEDORA-2022-35b698150c", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/" }, { "name": "FEDORA-2022-b9ef7c3c3c", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWY24RJA3SBJGA5N4CU4VBPHJPPPJL5O/" }, { "name": "FEDORA-2022-798fd95813", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMX5YHELQVCGKKQVFXIYOTBMN23YYSRO/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0003/" }, { "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3295-1] node-moment security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "moment", "vendor": "moment", "versions": [ { "status": "affected", "version": " \u003e= 2.18.0, \u003c 2.29.4" } ] } ], "descriptions": [ { "lang": "en", "value": "moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-31T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" }, { "url": "https://github.com/moment/moment/pull/6015#issuecomment-1152961973" }, { "url": "https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3" }, { "url": "https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/" }, { "name": "FEDORA-2022-85aa8e5706", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/" }, { "name": "FEDORA-2022-35b698150c", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/" }, { "name": "FEDORA-2022-b9ef7c3c3c", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWY24RJA3SBJGA5N4CU4VBPHJPPPJL5O/" }, { "name": "FEDORA-2022-798fd95813", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMX5YHELQVCGKKQVFXIYOTBMN23YYSRO/" }, { "url": "https://security.netapp.com/advisory/ntap-20221014-0003/" }, { "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3295-1] node-moment security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html" } ], "source": { "advisory": "GHSA-wc69-rhjr-hc9g", "discovery": "UNKNOWN" }, "title": "Inefficient Regular Expression Complexity in moment" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31129", "datePublished": "2022-07-06T00:00:00", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:11:39.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-31129\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-07-06T18:15:19.570\",\"lastModified\":\"2024-11-21T07:03:57.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.\"},{\"lang\":\"es\",\"value\":\"moment es una biblioteca de fechas en JavaScript para analizar, comprobar, manipular y formatear fechas. Se ha detectado que las versiones afectadas de moment usan un algoritmo de an\u00e1lisis sint\u00e1ctico ineficiente. Concretamente, el an\u00e1lisis sint\u00e1ctico de cadena a fecha en moment (m\u00e1s concretamente el an\u00e1lisis sint\u00e1ctico rfc2822, que es intentado por defecto) presenta una complejidad cuadr\u00e1tica (N^2) en entradas espec\u00edficas. Los usuarios pueden notar una notable ralentizaci\u00f3n con entradas de m\u00e1s de 10k caracteres. Los usuarios que pasan cadenas proporcionadas por el usuario sin comprobaciones de longitud de cordura al constructor del momento son vulnerables a ataques (Re)DoS. El problema est\u00e1 parcheado en versi\u00f3n 2.29.4, el parche puede aplicarse a todas las versiones afectadas con un m\u00ednimo ajuste. Es recomendado a usuarios actualicen. Los usuarios que no puedan actualizar deber\u00edan considerar la posibilidad de limitar la longitud de las fechas aceptadas por el usuario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:momentjs:moment:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"2.18.0\",\"versionEndExcluding\":\"2.29.4\",\"matchCriteriaId\":\"DBD8FD43-29F8-46F1-BEB0-B92B8BAEDAB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:momentjs:moment:*:*:*:*:*:nuget:*:*\",\"versionStartIncluding\":\"2.18.0\",\"versionEndExcluding\":\"2.29.4\",\"matchCriteriaId\":\"CAFF05BC-030E-49D6-A23D-A86D4731A748\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/moment/moment/pull/6015#issuecomment-1152961973\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWY24RJA3SBJGA5N4CU4VBPHJPPPJL5O/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMX5YHELQVCGKKQVFXIYOTBMN23YYSRO/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20221014-0003/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/moment/moment/pull/6015#issuecomment-1152961973\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWY24RJA3SBJGA5N4CU4VBPHJPPPJL5O/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZMX5YHELQVCGKKQVFXIYOTBMN23YYSRO/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20221014-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2022_5913
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openshift-istio-kiali-rhel8-container is now available for OpenShift Service Mesh 2.0.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Kiali for OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThis advisory covers containers for the release.\n\nSecurity Fix(es):\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5913", "url": "https://access.redhat.com/errata/RHSA-2022:5913" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "OSSM-1826", "url": "https://issues.redhat.com/browse/OSSM-1826" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5913.json" } ], "title": "Red Hat Security Advisory: Red Hat Kiali for OpenShift Service Mesh 2.0 security update", "tracking": { "current_release_date": "2024-12-18T00:33:00+00:00", "generator": { "date": "2024-12-18T00:33:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5913", "initial_release_date": "2022-08-08T08:09:05+00:00", "revision_history": [ { "date": "2022-08-08T08:09:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-08T08:09:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:33:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 2.0", "product": { "name": "OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:5df5cad697437cb4e5ddd2a6039c8a9aaf5c03c88fbf368f34f3573c25400c3c_s390x", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:5df5cad697437cb4e5ddd2a6039c8a9aaf5c03c88fbf368f34f3573c25400c3c_s390x", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:5df5cad697437cb4e5ddd2a6039c8a9aaf5c03c88fbf368f34f3573c25400c3c_s390x", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:5df5cad697437cb4e5ddd2a6039c8a9aaf5c03c88fbf368f34f3573c25400c3c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.24.16-1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:0cdedca320b0b172a471f71d459c923a6d02713b5957ce0619fdbcddffa04c35_amd64", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:0cdedca320b0b172a471f71d459c923a6d02713b5957ce0619fdbcddffa04c35_amd64", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:0cdedca320b0b172a471f71d459c923a6d02713b5957ce0619fdbcddffa04c35_amd64", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:0cdedca320b0b172a471f71d459c923a6d02713b5957ce0619fdbcddffa04c35?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.24.16-1" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:83277951b9a5b88f4306416c30d553de8aa4c3227c3befc84e447e65ecf2a7ff_ppc64le", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:83277951b9a5b88f4306416c30d553de8aa4c3227c3befc84e447e65ecf2a7ff_ppc64le", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:83277951b9a5b88f4306416c30d553de8aa4c3227c3befc84e447e65ecf2a7ff_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:83277951b9a5b88f4306416c30d553de8aa4c3227c3befc84e447e65ecf2a7ff?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.24.16-1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:0cdedca320b0b172a471f71d459c923a6d02713b5957ce0619fdbcddffa04c35_amd64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:0cdedca320b0b172a471f71d459c923a6d02713b5957ce0619fdbcddffa04c35_amd64" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:0cdedca320b0b172a471f71d459c923a6d02713b5957ce0619fdbcddffa04c35_amd64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:5df5cad697437cb4e5ddd2a6039c8a9aaf5c03c88fbf368f34f3573c25400c3c_s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:5df5cad697437cb4e5ddd2a6039c8a9aaf5c03c88fbf368f34f3573c25400c3c_s390x" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:5df5cad697437cb4e5ddd2a6039c8a9aaf5c03c88fbf368f34f3573c25400c3c_s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:83277951b9a5b88f4306416c30d553de8aa4c3227c3befc84e447e65ecf2a7ff_ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:83277951b9a5b88f4306416c30d553de8aa4c3227c3befc84e447e65ecf2a7ff_ppc64le" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:83277951b9a5b88f4306416c30d553de8aa4c3227c3befc84e447e65ecf2a7ff_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:0cdedca320b0b172a471f71d459c923a6d02713b5957ce0619fdbcddffa04c35_amd64", "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:5df5cad697437cb4e5ddd2a6039c8a9aaf5c03c88fbf368f34f3573c25400c3c_s390x", "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:83277951b9a5b88f4306416c30d553de8aa4c3227c3befc84e447e65ecf2a7ff_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-08T08:09:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:0cdedca320b0b172a471f71d459c923a6d02713b5957ce0619fdbcddffa04c35_amd64", "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:5df5cad697437cb4e5ddd2a6039c8a9aaf5c03c88fbf368f34f3573c25400c3c_s390x", "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:83277951b9a5b88f4306416c30d553de8aa4c3227c3befc84e447e65ecf2a7ff_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5913" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:0cdedca320b0b172a471f71d459c923a6d02713b5957ce0619fdbcddffa04c35_amd64", "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:5df5cad697437cb4e5ddd2a6039c8a9aaf5c03c88fbf368f34f3573c25400c3c_s390x", "8Base-OSSM-2.0:openshift-service-mesh/kiali-rhel8@sha256:83277951b9a5b88f4306416c30d553de8aa4c3227c3befc84e447e65ecf2a7ff_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_6277
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 2.1.5\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation.\n\nThis advisory covers the RPM packages for the release.\n\nSecurity Fix(es):\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n* moment: Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6277", "url": "https://access.redhat.com/errata/RHSA-2022:6277" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6277.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.5 security update", "tracking": { "current_release_date": "2024-12-18T00:35:31+00:00", "generator": { "date": "2024-12-18T00:35:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6277", "initial_release_date": "2022-08-31T16:58:21+00:00", "revision_history": [ { "date": "2022-08-31T16:58:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-31T16:58:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:35:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 2.1", "product": { "name": "OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:2.1.5-1.el8.src", "product": { "name": "servicemesh-proxy-0:2.1.5-1.el8.src", "product_id": "servicemesh-proxy-0:2.1.5-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.5-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.1.5-1.el8.src", "product": { "name": "servicemesh-operator-0:2.1.5-1.el8.src", "product_id": "servicemesh-operator-0:2.1.5-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.5-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:2.1.5-1.el8.src", "product": { "name": "servicemesh-0:2.1.5-1.el8.src", "product_id": "servicemesh-0:2.1.5-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.1.5-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.23.0-9.el8.src", "product": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.src", "product_id": "servicemesh-prometheus-0:2.23.0-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-ratelimit-0:2.1.5-1.el8.src", "product": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.src", "product_id": "servicemesh-ratelimit-0:2.1.5-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-proxy-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-proxy-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debugsource@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debuginfo@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-operator-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-operator-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-cni-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-cni-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "product": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "product_id": "servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-ratelimit-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-ratelimit-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debugsource@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debuginfo@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-operator-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-operator-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-cni-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-cni-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "product": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "product_id": "servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-proxy-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-proxy-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debugsource@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debuginfo@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-operator-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-operator-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-cni-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-cni-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.23.0-9.el8.s390x", "product": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.s390x", "product_id": "servicemesh-prometheus-0:2.23.0-9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "product": { "name": "servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "product_id": "servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-wasm@2.1.5-1.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.1.5-1.el8.src as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src" }, "product_reference": "servicemesh-0:2.1.5-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-cni-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-cni-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-cni-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-operator-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-operator-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.1.5-1.el8.src as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src" }, "product_reference": "servicemesh-operator-0:2.1.5-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-operator-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le" }, "product_reference": "servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x" }, "product_reference": "servicemesh-prometheus-0:2.23.0-9.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.src as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src" }, "product_reference": "servicemesh-prometheus-0:2.23.0-9.el8.src", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-proxy-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.1.5-1.el8.src as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src" }, "product_reference": "servicemesh-proxy-0:2.1.5-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch" }, "product_reference": "servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.src as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src" }, "product_reference": "servicemesh-ratelimit-0:2.1.5-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-ratelimit-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_6835
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update to the images for Red Hat Integration Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Integration - Service registry 2.3.0.GA serves as a replacement for 2.0.3.GA, and includes the below security fixes.\n\nSecurity Fix(es):\n\n* cron-utils: template Injection leading to unauthenticated Remote Code Execution (CVE-2021-41269)\n\n* prismjs: improperly escaped output allows a XSS (CVE-2022-23647)\n\n* snakeyaml: Denial of Service due missing to nested depth limitation for collections (CVE-2022-25857)\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* protobuf-java: potential DoS in the parsing procedure for binary data (CVE-2021-22569)\n\n* quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus (CVE-2022-0981)\n\n* quarkus-jdbc-postgresql-deployment: jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes (CVE-2022-21724)\n\n* netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)\n\n* netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data (CVE-2021-37136)\n\n* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)\n\n* follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)\n\n* jdbc-postgresql: postgresql-jdbc: Arbitrary File Write Vulnerability (CVE-2022-26520)\n\n* node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery (CVE-2022-24771)\n\n* node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery (CVE-2022-24772)\n\n* node-forge: Signature verification leniency in checking `DigestInfo` structure (CVE-2022-24773)\n\n* com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson (CVE-2022-25647)\n\n* terser: insecure use of regular expressions leads to ReDoS (CVE-2022-25858)\n\n* graphql-java: DoS by malicious query (CVE-2022-37734)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6835", "url": "https://access.redhat.com/errata/RHSA-2022:6835" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2004133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004133" }, { "category": "external", "summary": "2004135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004135" }, { "category": "external", "summary": "2024632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024632" }, { "category": "external", "summary": "2039903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039903" }, { "category": "external", "summary": "2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "2050863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050863" }, { "category": "external", "summary": "2053259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053259" }, { "category": "external", "summary": "2056643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056643" }, { "category": "external", "summary": "2062520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062520" }, { "category": "external", "summary": "2064007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064007" }, { "category": "external", "summary": "2067387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067387" }, { "category": "external", "summary": "2067458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067458" }, { "category": "external", "summary": "2067461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067461" }, { "category": "external", "summary": "2080850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080850" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2126277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126277" }, { "category": "external", "summary": "2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "2126809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126809" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6835.json" } ], "title": "Red Hat Security Advisory: Service Registry (container images) release and security update [2.3.0.GA]", "tracking": { "current_release_date": "2024-12-18T00:37:04+00:00", "generator": { "date": "2024-12-18T00:37:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6835", "initial_release_date": "2022-10-06T12:26:20+00:00", "revision_history": [ { "date": "2022-10-06T12:26:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-10-06T12:26:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:37:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHINT Service Registry 2.3.0 GA", "product": { "name": "RHINT Service Registry 2.3.0 GA", "product_id": "RHINT Service Registry 2.3.0 GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_registry:2.3" } } } ], "category": "product_family", "name": "Red Hat Integration" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22569", "cwe": { "id": "CWE-696", "name": "Incorrect Behavior Order" }, "discovery_date": "2022-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2039903" } ], "notes": [ { "category": "description", "text": "A flaw was found in protobuf-java. Google Protocol Buffer (protobuf-java) allows the interleaving of com.google.protobuf.UnknownFieldSet fields. By persuading a victim to open specially-crafted content, a remote attacker could cause a timeout in the ProtobufFuzzer function, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf-java: potential DoS in the parsing procedure for binary data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22569" }, { "category": "external", "summary": "RHBZ#2039903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22569", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22569" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22569", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22569" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/b3093dce58bc9d3042f085666d83c8ef1f51fe7b", "url": "https://github.com/protocolbuffers/protobuf/commit/b3093dce58bc9d3042f085666d83c8ef1f51fe7b" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67", "url": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67" } ], "release_date": "2022-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "protobuf-java: potential DoS in the parsing procedure for binary data" }, { "cve": "CVE-2021-37136", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2004133" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty\u0027s netty-codec due to size restrictions for decompressed data in the Bzip2Decoder. By sending a specially-crafted input, a remote attacker could cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data", "title": "Vulnerability summary" }, { "category": "other", "text": "In the OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack ship the vulnerable version of netty-codec package. Since the release of OCP 4.6, the Metering product has been deprecated [1], so the affected components are marked as wontfix. This may be fixed in the future.\n\nStarting in OCP 4.7, the elasticsearch component is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37136" }, { "category": "external", "summary": "RHBZ#2004133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004133" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37136", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37136" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv", "url": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv" } ], "release_date": "2021-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data" }, { "cve": "CVE-2021-37137", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2004135" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Netty\u0027s netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a specially-crafted input, a remote attacker could cause excessive memory usage resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of netty-codec package.\nSince the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\nStarting in OCP 4.7, the elasticsearch component is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37137" }, { "category": "external", "summary": "RHBZ#2004135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37137", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37137" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv", "url": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv" } ], "release_date": "2021-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way" }, { "cve": "CVE-2021-41269", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2021-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2024632" } ], "notes": [ { "category": "description", "text": "A flaw was found in cron-utils. This flaw allows an attacker to perform unauthenticated Remote Code Execution (RCE) via Java Expression Language (EL) injection.", "title": "Vulnerability description" }, { "category": "summary", "text": "cron-utils: template Injection leading to unauthenticated Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Only projects using the @Cron annotation to validate untrusted Cron expressions are affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41269" }, { "category": "external", "summary": "RHBZ#2024632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024632" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41269", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41269" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41269", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41269" } ], "release_date": "2021-11-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "cron-utils: template Injection leading to unauthenticated Remote Code Execution" }, { "cve": "CVE-2022-0235", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2022-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044591" } ], "notes": [ { "category": "description", "text": "A flaw was found in node-fetch. When following a redirect to a third-party domain, node-fetch was forwarding sensitive headers such as \"Authorization,\" \"WWW-Authenticate,\" and \"Cookie\" to potentially untrusted targets. This flaw leads to the exposure of sensitive information to an unauthorized actor.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-fetch: exposure of sensitive information to an unauthorized actor", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for dotnet-5.0. For more information about Dotnet product support scope, please see https://access.redhat.com/support/policy/updates/net-core", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0235" }, { "category": "external", "summary": "RHBZ#2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235" }, { "category": "external", "summary": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/", "url": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/" } ], "release_date": "2022-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "node-fetch: exposure of sensitive information to an unauthorized actor" }, { "cve": "CVE-2022-0536", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2022-02-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053259" } ], "notes": [ { "category": "description", "text": "A flaw was found in the follow-redirects package. This flaw allows the exposure of sensitive information to an unauthorized actor due to the usage of insecure HTTP protocol. This issue happens with an Authorization header leak from the same hostname, https-http, and requires a Man-in-the-Middle (MITM) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Exposure of Sensitive Information via Authorization Header leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0536" }, { "category": "external", "summary": "RHBZ#2053259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0536", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0536" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "follow-redirects: Exposure of Sensitive Information via Authorization Header leak" }, { "acknowledgments": [ { "names": [ "Sanne Grinovero" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2022-0981", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2022-02-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062520" } ], "notes": [ { "category": "description", "text": "A flaw was found in Quarkus. The state and potentially associated permissions can leak from one web request to another in RestEasy Reactive. This flaw allows a low-privileged user to perform operations on the database with a different set of privileges than intended.", "title": "Vulnerability description" }, { "category": "summary", "text": "quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus", "title": "Vulnerability summary" }, { "category": "other", "text": "CodeReady Studio is no longer supported and therefore this flaw will not be addressed in CodeReady Studio. Please see https://developers.redhat.com/articles/2022/04/18/announcement-red-hat-codeready-studio-reaches-end-life for more information.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0981" }, { "category": "external", "summary": "RHBZ#2062520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062520" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0981", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0981" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0981", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0981" }, { "category": "external", "summary": "https://github.com/quarkusio/quarkus/issues/23269", "url": "https://github.com/quarkusio/quarkus/issues/23269" } ], "release_date": "2022-02-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus" }, { "cve": "CVE-2022-21724", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2022-02-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050863" } ], "notes": [ { "category": "description", "text": "pgjdbc is the offical PostgreSQL JDBC Driver. A security hole was found in the jdbc driver for postgresql database while doing security research. The system using the postgresql library will be attacked when attacker control the jdbc url or properties. pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. This can lead to code execution loaded via arbitrary classes. Users using plugins are advised to upgrade. There are no known workarounds for this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes", "title": "Vulnerability summary" }, { "category": "other", "text": "According to the patch upstream the scoring of this issue has been severely reduced and is no longer considered an RCE. Therefore, the flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21724" }, { "category": "external", "summary": "RHBZ#2050863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21724" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-v7wg-cpwc-24m4", "url": "https://github.com/advisories/GHSA-v7wg-cpwc-24m4" } ], "release_date": "2022-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes" }, { "cve": "CVE-2022-23647", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2022-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056643" } ], "notes": [ { "category": "description", "text": "A Cross-site scripting attack was found in Prism. The command-line plugin did not properly escape its output. This issue leads to the input text being inserted into the Document Object Model (DOM) as HTML code, which can be exploited by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "prismjs: improperly escaped output allows a XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects Prism as shipped with all versions of Red Hat Ceph Storage, Red Hat Migration Toolkit for Virtualization, Red Hat OpenShift Container Platform, Red Hat OpenShift Service Mesh, Red Hat Advanced Cluster Security, and Red Hat Gluster Storage. However, this flaw is not known to be exploitable under any supported scenario, as websites that do not use the Command Line plugin are also not impacted. The above products do not use the Command Line plugin, thus, are marked not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23647" }, { "category": "external", "summary": "RHBZ#2056643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056643" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23647", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23647" }, { "category": "external", "summary": "https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99", "url": "https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99" } ], "release_date": "2022-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "prismjs: improperly escaped output allows a XSS" }, { "cve": "CVE-2022-24771", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067387" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge package. This signature verification leniency allows an attacker to forge a signature.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects the DigestAlgorithm structure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24771" }, { "category": "external", "summary": "RHBZ#2067387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24771", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24771" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery" }, { "cve": "CVE-2022-24772", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067458" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge package. This signature verification leniency allows an attacker to forge a signature.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects the DigestInfo ASN.1 structure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24772" }, { "category": "external", "summary": "RHBZ#2067458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24772" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery" }, { "cve": "CVE-2022-24773", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067461" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge library when verifying the signature on the ASN.1 structure in RSA PKCS#1 v1.5. This flaw allows an attacker to obtain successful verification for invalid DigestInfo structure, affecting the integrity of the attacked resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification leniency in checking `DigestInfo` structure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24773" }, { "category": "external", "summary": "RHBZ#2067461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24773" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-forge: Signature verification leniency in checking `DigestInfo` structure" }, { "cve": "CVE-2022-25647", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-05-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2080850" } ], "notes": [ { "category": "description", "text": "A flaw was found in gson, which is vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes. This issue may lead to availability attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25647" }, { "category": "external", "summary": "RHBZ#2080850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080850" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25647", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25647" } ], "release_date": "2022-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson" }, { "cve": "CVE-2022-25857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126789" } ], "notes": [ { "category": "description", "text": "A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Denial of Service due to missing nested depth limitation for collections", "title": "Vulnerability summary" }, { "category": "other", "text": "For RHEL-8 it\u0027s downgraded to moderate because \"snakeyaml\" itself in RHEL 8 or RHEL-9 isn\u0027t shipped and \"prometheus-jmx-exporter\" is needed as build dependency. And it\u0027s not directly exploitable, hence severity marked as moderate.\nRed Hat Integration and AMQ products are not vulnerable to this flaw, so their severity has been lowered to moderate.\nRed Hat Single Sign-On uses snakeyaml from liquibase-core and is only used when performing migrations and would require administrator privileges to execute, hence severity marked as Low.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be present soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25857" }, { "category": "external", "summary": "RHBZ#2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25857", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857" }, { "category": "external", "summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525" } ], "release_date": "2022-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "snakeyaml: Denial of Service due to missing nested depth limitation for collections" }, { "cve": "CVE-2022-25858", "discovery_date": "2022-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126277" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the terser package. Affected versions of this package are vulnerable to Regular expression denial of service (ReDoS) attacks, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "terser: insecure use of regular expressions leads to ReDoS", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Do (odo) product terser is shipped only for using in static page generators for upstream, thus this represents no security risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25858" }, { "category": "external", "summary": "RHBZ#2126277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25858", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25858" } ], "release_date": "2022-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "terser: insecure use of regular expressions leads to ReDoS" }, { "cve": "CVE-2022-26520", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2022-03-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064007" } ], "notes": [ { "category": "description", "text": "A flaw was found in Postgres JDBC. This flaw allows an attacker to use a method to write arbitrary files through the connection properties settings. For example, an attacker can create an executable file under the server the application is running and make it a new part of the application or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "postgresql-jdbc: Arbitrary File Write Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat informs that although there\u0027s a difference from NVD CVSSv3 score there\u0027s a especial occasion in this CVE that maintain it as a moderate. The scenario for an attacker to get a benefit in this situation requires them to have access to modify a configuration file and write a file where it\u0027s needed. This require non-default configuration and also it\u0027s not expected to allow an untrusted user to perform this kind of setting.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26520" }, { "category": "external", "summary": "RHBZ#2064007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064007" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26520", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26520" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26520", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26520" } ], "release_date": "2022-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "postgresql-jdbc: Arbitrary File Write Vulnerability" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-37734", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "discovery_date": "2022-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126809" } ], "notes": [ { "category": "description", "text": "A flaw was found in GraphQL Java. This flaw allows an attacker to use a malicious query in GraphQL to cause a denial of service due to inefficient lexer input validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "graphql-java: DoS by malicious query", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.3.0 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-37734" }, { "category": "external", "summary": "RHBZ#2126809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126809" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-37734", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37734" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-37734", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37734" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-06T12:26:20+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.3.0 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Service Registry 2.3.0 GA" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "graphql-java: DoS by malicious query" } ] }
rhsa-2022_6813
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Process Automation Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.\n\nThis asynchronous security patch is an update to Red Hat Process Automation Manager 7.\n\nSecurity Fix(es):\n\n* chart.js: prototype pollution (CVE-2020-7746)\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 (CVE-2021-23436)\n\n* artemis-commons: Apache ActiveMQ Artemis DoS (CVE-2022-23913)\n\n* Business-central: Possible XML External Entity Injection attack (CVE-2022-2458)\n\n* cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-1365)\n\n* jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)\n\n* jdbc-postgresql: postgresql-jdbc: Arbitrary File Write Vulnerability (CVE-2022-26520)\n\n* jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes (CVE-2022-21724)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\n* org.drools-droolsjbpm-integration: minimist: prototype pollution (CVE-2021-44906)\n\n* org.kie.workbench-kie-wb-common: minimist: prototype pollution (CVE-2021-44906)\n\n* parse-url: Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository ionicabizau/parse-url (CVE-2022-0722)\n\n* xercesimpl: xerces-j2: infinite loop when handling specially crafted XML document payloads (CVE-2022-23437)\n\n* eventsource: Exposure of Sensitive Information (CVE-2022-1650)\n\n* mysql-connector-java: Difficult to exploit vulnerability allows a high privileged attacker with network access via multiple protocols to compromise MySQL Connectors (CVE-2022-21363)\n\n* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)\n\n* node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery (CVE-2022-24772)\n\n* node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery (CVE-2022-24771)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6813", "url": "https://access.redhat.com/errata/RHSA-2022:6813" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2041833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041833" }, { "category": "external", "summary": "2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "2047200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047200" }, { "category": "external", "summary": "2047343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047343" }, { "category": "external", "summary": "2050863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050863" }, { "category": "external", "summary": "2063601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063601" }, { "category": "external", "summary": "2064007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064007" }, { "category": "external", "summary": "2064698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698" }, { "category": "external", "summary": "2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "2067387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067387" }, { "category": "external", "summary": "2067458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067458" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2076133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076133" }, { "category": "external", "summary": "2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "2096966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096966" }, { "category": "external", "summary": "2103584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103584" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2107994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107994" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6813.json" } ], "title": "Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.1 security update", "tracking": { "current_release_date": "2024-12-18T00:36:53+00:00", "generator": { "date": "2024-12-18T00:36:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6813", "initial_release_date": "2022-10-05T10:44:49+00:00", "revision_history": [ { "date": "2022-10-05T10:44:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-10-05T10:44:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:36:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHPAM 7.13.1 async", "product": { "name": "RHPAM 7.13.1 async", "product_id": "RHPAM 7.13.1 async", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7746", "discovery_date": "2020-10-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2096966" } ], "notes": [ { "category": "description", "text": "A flaw was found in chart.js. This issue occurs when the options parameter is not properly sanitized when it is processed. When options are processed, the object\u0027s keys that are being set are not checked, possibly allowing a prototype pollution.", "title": "Vulnerability description" }, { "category": "summary", "text": "chart.js: prototype pollution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7746" }, { "category": "external", "summary": "RHBZ#2096966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7746", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7746" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7746", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7746" } ], "release_date": "2020-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chart.js: prototype pollution" }, { "cve": "CVE-2020-36518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064698" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Jackson Databind package. This cause of the issue is due to a Java StackOverflow exception and a denial of service via a significant depth of nested objects.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: denial of service via a large depth of nested objects", "title": "Vulnerability summary" }, { "category": "other", "text": "CodeReady Studio is no longer supported and therefore this flaw will not be addressed in CodeReady Studio.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36518" }, { "category": "external", "summary": "RHBZ#2064698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36518", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-57j2-w4cx-62h2", "url": "https://github.com/advisories/GHSA-57j2-w4cx-62h2" } ], "release_date": "2020-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: denial of service via a large depth of nested objects" }, { "cve": "CVE-2021-23436", "discovery_date": "2021-10-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041833" } ], "notes": [ { "category": "description", "text": "A prototype pollution flaw was found in the Node.js immer module. By adding or modifying properties of Object.prototype using a __proto__ or constructor payload, an attacker could execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "immer: type confusion vulnerability can lead to a bypass of CVE-2020-28477", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23436" }, { "category": "external", "summary": "RHBZ#2041833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041833" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23436", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23436" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23436", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23436" } ], "release_date": "2021-09-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "immer: type confusion vulnerability can lead to a bypass of CVE-2020-28477" }, { "cve": "CVE-2021-44906", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2066009" } ], "notes": [ { "category": "description", "text": "An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker to trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "minimist: prototype pollution", "title": "Vulnerability summary" }, { "category": "other", "text": "The original fix for CVE-2020-7598 was incomplete as it was still possible to bypass in some cases. While this flaw (CVE-2021-44906) enables attackers to control objects that they should not have access to, actual exploitation would still require a chain of independent flaws. Even though the CVSS for CVE-2021-44906 is higher than CVE-2020-7598, they are both rated as having Moderate impact.\n\nWithin Red Hat Satellite 6 this flaw has been rated as having a security impact of Low. It is not currently planned to be addressed there, as the minimist library is only included in the -doc subpackage and is part of test fixtures that are not in the execution path used by the rabl gem.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44906" }, { "category": "external", "summary": "RHBZ#2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-xvch-5gv4-984h", "url": "https://github.com/advisories/GHSA-xvch-5gv4-984h" } ], "release_date": "2022-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "minimist: prototype pollution" }, { "cve": "CVE-2022-0235", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2022-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044591" } ], "notes": [ { "category": "description", "text": "A flaw was found in node-fetch. When following a redirect to a third-party domain, node-fetch was forwarding sensitive headers such as \"Authorization,\" \"WWW-Authenticate,\" and \"Cookie\" to potentially untrusted targets. This flaw leads to the exposure of sensitive information to an unauthorized actor.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-fetch: exposure of sensitive information to an unauthorized actor", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for dotnet-5.0. For more information about Dotnet product support scope, please see https://access.redhat.com/support/policy/updates/net-core", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0235" }, { "category": "external", "summary": "RHBZ#2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235" }, { "category": "external", "summary": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/", "url": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/" } ], "release_date": "2022-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "node-fetch: exposure of sensitive information to an unauthorized actor" }, { "cve": "CVE-2022-0722", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2022-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2103584" } ], "notes": [ { "category": "description", "text": "A flaw was found in the parse-url package. Affected versions of this package are vulnerable to information exposure due to an improper validation issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "parse-url: Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository ionicabizau/parse-url", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0722" }, { "category": "external", "summary": "RHBZ#2103584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0722", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0722" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0722", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0722" }, { "category": "external", "summary": "https://huntr.dev/bounties/2490ef6d-5577-4714-a4dd-9608251b4226", "url": "https://huntr.dev/bounties/2490ef6d-5577-4714-a4dd-9608251b4226" } ], "release_date": "2022-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "parse-url: Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository ionicabizau/parse-url" }, { "cve": "CVE-2022-1365", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "discovery_date": "2022-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2076133" } ], "notes": [ { "category": "description", "text": "A flaw was found in the cross-fetch library when fetching a remote URL with a cookie when it gets to the Location response header. This flaw allows an attacker to hijack the account as the cookie is leaked.", "title": "Vulnerability description" }, { "category": "summary", "text": "cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1365" }, { "category": "external", "summary": "RHBZ#2076133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076133" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1365", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1365" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1365", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1365" }, { "category": "external", "summary": "https://huntr.dev/bounties/ab55dfdd-2a60-437a-a832-e3efe3d264ac/", "url": "https://huntr.dev/bounties/ab55dfdd-2a60-437a-a832-e3efe3d264ac/" } ], "release_date": "2022-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor" }, { "acknowledgments": [ { "names": [ "Paulino Calderon" ], "organization": "Websec" } ], "cve": "CVE-2022-1415", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2065505" } ], "notes": [ { "category": "description", "text": "A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.", "title": "Vulnerability description" }, { "category": "summary", "text": "drools: unsafe data deserialization in StreamUtils", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1415" }, { "category": "external", "summary": "RHBZ#2065505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2065505" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1415", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1415" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1415", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1415" } ], "release_date": "2022-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "drools: unsafe data deserialization in StreamUtils" }, { "cve": "CVE-2022-1650", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "discovery_date": "2022-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2085307" } ], "notes": [ { "category": "description", "text": "A flaw was found in the EventSource NPM Package. The description from the source states the following message: \"Exposure of Sensitive Information to an Unauthorized Actor.\" This flaw allows an attacker to steal the user\u0027s credentials and then use the credentials to access the legitimate website.", "title": "Vulnerability description" }, { "category": "summary", "text": "eventsource: Exposure of Sensitive Information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1650" }, { "category": "external", "summary": "RHBZ#2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1650", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650" }, { "category": "external", "summary": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", "url": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e" } ], "release_date": "2022-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "eventsource: Exposure of Sensitive Information" }, { "cve": "CVE-2022-2458", "cwe": { "id": "CWE-91", "name": "XML Injection (aka Blind XPath Injection)" }, "discovery_date": "2022-07-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107994" } ], "notes": [ { "category": "description", "text": "An XML external entity injection(XXE) vulnerability was found in Business Central. This flaw allows an attacker to interfere with an application\u0027s processing of XML data. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. The software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. Here, the XML external entity injection leads to External Service interaction and an Internal file read in Business Central and Kie-Server APIs.", "title": "Vulnerability description" }, { "category": "summary", "text": "Business-central: Possible XML External Entity Injection attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2458" }, { "category": "external", "summary": "RHBZ#2107994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2458", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2458" } ], "release_date": "2022-07-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Business-central: Possible XML External Entity Injection attack" }, { "cve": "CVE-2022-21363", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2047343" } ], "notes": [ { "category": "description", "text": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21363" }, { "category": "external", "summary": "RHBZ#2047343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047343" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21363", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21363" }, { "category": "external", "summary": "https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL", "url": "https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors" }, { "cve": "CVE-2022-21724", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2022-02-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050863" } ], "notes": [ { "category": "description", "text": "pgjdbc is the offical PostgreSQL JDBC Driver. A security hole was found in the jdbc driver for postgresql database while doing security research. The system using the postgresql library will be attacked when attacker control the jdbc url or properties. pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. This can lead to code execution loaded via arbitrary classes. Users using plugins are advised to upgrade. There are no known workarounds for this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes", "title": "Vulnerability summary" }, { "category": "other", "text": "According to the patch upstream the scoring of this issue has been severely reduced and is no longer considered an RCE. Therefore, the flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21724" }, { "category": "external", "summary": "RHBZ#2050863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21724" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-v7wg-cpwc-24m4", "url": "https://github.com/advisories/GHSA-v7wg-cpwc-24m4" } ], "release_date": "2022-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes" }, { "acknowledgments": [ { "names": [ "Sergey Temnikov", "Ziyi Luo" ], "organization": "Amazon Corretto", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-23437", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2047200" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This issue causes the XercesJ XML parser to wait in an infinite loop, which may consume system resources for a prolonged duration, leading to a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "xerces-j2: infinite loop when handling specially crafted XML document payloads", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23437" }, { "category": "external", "summary": "RHBZ#2047200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23437" } ], "release_date": "2022-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xerces-j2: infinite loop when handling specially crafted XML document payloads" }, { "cve": "CVE-2022-23913", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2063601" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "artemis-commons: Apache ActiveMQ Artemis DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23913" }, { "category": "external", "summary": "RHBZ#2063601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23913", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23913" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23913", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23913" }, { "category": "external", "summary": "https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2", "url": "https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2" } ], "release_date": "2022-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "artemis-commons: Apache ActiveMQ Artemis DoS" }, { "cve": "CVE-2022-24771", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067387" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge package. This signature verification leniency allows an attacker to forge a signature.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects the DigestAlgorithm structure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24771" }, { "category": "external", "summary": "RHBZ#2067387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24771", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24771" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery" }, { "cve": "CVE-2022-24772", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067458" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge package. This signature verification leniency allows an attacker to forge a signature.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects the DigestInfo ASN.1 structure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24772" }, { "category": "external", "summary": "RHBZ#2067458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24772" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "RHPAM 7.13.1 async" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-26520", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2022-03-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064007" } ], "notes": [ { "category": "description", "text": "A flaw was found in Postgres JDBC. This flaw allows an attacker to use a method to write arbitrary files through the connection properties settings. For example, an attacker can create an executable file under the server the application is running and make it a new part of the application or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "postgresql-jdbc: Arbitrary File Write Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat informs that although there\u0027s a difference from NVD CVSSv3 score there\u0027s a especial occasion in this CVE that maintain it as a moderate. The scenario for an attacker to get a benefit in this situation requires them to have access to modify a configuration file and write a file where it\u0027s needed. This require non-default configuration and also it\u0027s not expected to allow an untrusted user to perform this kind of setting.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26520" }, { "category": "external", "summary": "RHBZ#2064007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064007" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26520", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26520" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26520", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26520" } ], "release_date": "2022-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "postgresql-jdbc: Arbitrary File Write Vulnerability" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHPAM 7.13.1 async" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-05T10:44:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nRed Hat recommends that you halt the server by stopping the JBoss Application Server process before installing this update. After installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link. You must log in to download the update.", "product_ids": [ "RHPAM 7.13.1 async" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHPAM 7.13.1 async" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_8652
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.11 to 7.11.1) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.11.1 serves as a replacement for Red Hat Fuse 7.11 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References.\n\nSecurity Fix(es):\n\n* hsqldb: Untrusted input may lead to RCE attack [fuse-7] (CVE-2022-41853)\n\n* io.hawt-hawtio-online: bootstrap: XSS in the tooltip or popover data-template attribute [fuse-7] (CVE-2019-8331)\n\n* io.hawt-project: bootstrap: XSS in the tooltip or popover data-template attribute [fuse-7] (CVE-2019-8331)\n\n* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users [fuse-7] (CVE-2021-3717)\n\n* json-smart: Denial of Service in JSONParserByteArray function [fuse-7] (CVE-2021-31684)\n\n* io.hawt-hawtio-integration: minimist: prototype pollution [fuse-7] (CVE-2021-44906)\n\n* urijs: Authorization Bypass Through User-Controlled Key [fuse-7] (CVE-2022-0613)\n\n* http2-server: Invalid HTTP/2 requests cause DoS [fuse-7] (CVE-2022-2048)\n\n* snakeyaml: Denial of Service due to missing nested depth limitation for collections [fuse-7] (CVE-2022-25857)\n\n* urijs: Leading white space bypasses protocol validation [fuse-7] (CVE-2022-24723)\n\n* Moment.js: Path traversal in moment.locale [fuse-7] (CVE-2022-24785)\n\n* netty: world readable temporary file containing sensitive data [fuse-7] (CVE-2022-24823)\n\n* jdbc-postgresql: postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names [fuse-7] (CVE-2022-31197)\n\n* commons-configuration2: apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults [fuse-7] (CVE-2022-33980)\n\n* commons-text: apache-commons-text: variable interpolation RCE [fuse-7] (CVE-2022-42889)\n\n* undertow: Large AJP request may cause DoS [fuse-7] (CVE-2022-2053)\n\n* moment: inefficient parsing algorithm resulting in DoS [fuse-7] (CVE-2022-31129)\n\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode [fuse-7] (CVE-2022-38749)\n\nFor more details about the security issues, including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:8652", "url": "https://access.redhat.com/errata/RHSA-2022:8652" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1686454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686454" }, { "category": "external", "summary": "1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "2055496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055496" }, { "category": "external", "summary": "2062370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062370" }, { "category": "external", "summary": "2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2087186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087186" }, { "category": "external", "summary": "2095862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095862" }, { "category": "external", "summary": "2102695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102695" }, { "category": "external", "summary": "2105067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105067" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2116952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116952" }, { "category": "external", "summary": "2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "2129428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129428" }, { "category": "external", "summary": "2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "2135435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135435" }, { "category": "external", "summary": "2136141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8652.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.11.1 release and security update", "tracking": { "current_release_date": "2024-12-18T00:37:36+00:00", "generator": { "date": "2024-12-18T00:37:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:8652", "initial_release_date": "2022-11-28T14:39:27+00:00", "revision_history": [ { "date": "2022-11-28T14:39:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-28T14:39:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:37:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.11.1", "product": { "name": "Red Hat Fuse 7.11.1", "product_id": "Red Hat Fuse 7.11.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-8331", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-02-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1686454" } ], "notes": [ { "category": "description", "text": "A cross-site scripting vulnerability was discovered in bootstrap. If an attacker could control the data given to tooltip or popover, they could inject HTML or Javascript into the rendered page when tooltip or popover events fired.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: XSS in the tooltip or popover data-template attribute", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-8331" }, { "category": "external", "summary": "RHBZ#1686454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-8331", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8331" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-8331", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-8331" } ], "release_date": "2019-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: XSS in the tooltip or popover data-template attribute" }, { "cve": "CVE-2021-3717", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2021-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1991305" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3717" }, { "category": "external", "summary": "RHBZ#1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users" }, { "cve": "CVE-2021-31684", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2102695" } ], "notes": [ { "category": "description", "text": "A flaw was found in the json-smart package in the JSONParserByteArray. This flaw allows an attacker to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "json-smart: Denial of Service in JSONParserByteArray function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31684" }, { "category": "external", "summary": "RHBZ#2102695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102695" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31684", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31684" } ], "release_date": "2021-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "json-smart: Denial of Service in JSONParserByteArray function" }, { "cve": "CVE-2021-44906", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2066009" } ], "notes": [ { "category": "description", "text": "An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker to trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "minimist: prototype pollution", "title": "Vulnerability summary" }, { "category": "other", "text": "The original fix for CVE-2020-7598 was incomplete as it was still possible to bypass in some cases. While this flaw (CVE-2021-44906) enables attackers to control objects that they should not have access to, actual exploitation would still require a chain of independent flaws. Even though the CVSS for CVE-2021-44906 is higher than CVE-2020-7598, they are both rated as having Moderate impact.\n\nWithin Red Hat Satellite 6 this flaw has been rated as having a security impact of Low. It is not currently planned to be addressed there, as the minimist library is only included in the -doc subpackage and is part of test fixtures that are not in the execution path used by the rabl gem.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44906" }, { "category": "external", "summary": "RHBZ#2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-xvch-5gv4-984h", "url": "https://github.com/advisories/GHSA-xvch-5gv4-984h" } ], "release_date": "2022-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "minimist: prototype pollution" }, { "cve": "CVE-2022-0613", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "discovery_date": "2022-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2055496" } ], "notes": [ { "category": "description", "text": "A flaw was found in urijs due to the fix of CVE-2021-3647 not considering case-sensitive protocol schemes in the URL. This issue allows attackers to bypass the patch.", "title": "Vulnerability description" }, { "category": "summary", "text": "urijs: Authorization Bypass Through User-Controlled Key", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0613" }, { "category": "external", "summary": "RHBZ#2055496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0613", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0613" } ], "release_date": "2022-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "urijs: Authorization Bypass Through User-Controlled Key" }, { "cve": "CVE-2022-2048", "cwe": { "id": "CWE-410", "name": "Insufficient Resource Pool" }, "discovery_date": "2022-08-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2116952" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Eclipse Jetty http2-server package. This flaw allows an attacker to cause a denial of service in the server via HTTP/2 requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "http2-server: Invalid HTTP/2 requests cause DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2048" }, { "category": "external", "summary": "RHBZ#2116952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116952" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2048", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2048" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2048", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2048" }, { "category": "external", "summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j" } ], "release_date": "2022-07-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "http2-server: Invalid HTTP/2 requests cause DoS" }, { "cve": "CVE-2022-2053", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095862" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. AJP requests to the server may allow an attacker to send a malicious request and trigger server errors, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Large AJP request may cause DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse 7 is now in Maintenance Support Phase and is marked Fixed. However, Red Hat Fuse Online does not contain the fix for this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2053" }, { "category": "external", "summary": "RHBZ#2095862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2053", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2053" } ], "release_date": "2022-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Large AJP request may cause DoS" }, { "cve": "CVE-2022-24723", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-03-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062370" } ], "notes": [ { "category": "description", "text": "An improper input validation flaw was found in urijs where white space characters are not removed from the beginning of an URL. This issue allows bypassing the protocol validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "urijs: Leading white space bypasses protocol validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24723" }, { "category": "external", "summary": "RHBZ#2062370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062370" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24723" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "urijs: Leading white space bypasses protocol validation" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "Red Hat Fuse 7.11.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-24823", "cwe": { "id": "CWE-379", "name": "Creation of Temporary File in Directory with Insecure Permissions" }, "discovery_date": "2022-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2087186" } ], "notes": [ { "category": "description", "text": "CVE-2021-21290 contains an incomplete fix, and this addresses the issue found in netty. When using multipart decoders in netty, local information disclosure can occur via the local system temporary directory if temporary storing of uploads on the disk is enabled.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: world readable temporary file containing sensitive data", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users.\n\nRed Hat Satellite 6 is not affected as is using netty 3.6.7 version which is not impacted by this vulnerability.\n\nRed Hat Fuse 7 is now in Maintenance Support Phase and should be fixed soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24823" }, { "category": "external", "summary": "RHBZ#2087186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087186" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24823", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24823" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" }, { "category": "workaround", "details": "As a workaround, specify one\u0027s own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.", "product_ids": [ "Red Hat Fuse 7.11.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: world readable temporary file containing sensitive data" }, { "cve": "CVE-2022-25857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126789" } ], "notes": [ { "category": "description", "text": "A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Denial of Service due to missing nested depth limitation for collections", "title": "Vulnerability summary" }, { "category": "other", "text": "For RHEL-8 it\u0027s downgraded to moderate because \"snakeyaml\" itself in RHEL 8 or RHEL-9 isn\u0027t shipped and \"prometheus-jmx-exporter\" is needed as build dependency. And it\u0027s not directly exploitable, hence severity marked as moderate.\nRed Hat Integration and AMQ products are not vulnerable to this flaw, so their severity has been lowered to moderate.\nRed Hat Single Sign-On uses snakeyaml from liquibase-core and is only used when performing migrations and would require administrator privileges to execute, hence severity marked as Low.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be present soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25857" }, { "category": "external", "summary": "RHBZ#2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25857", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857" }, { "category": "external", "summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525" } ], "release_date": "2022-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Denial of Service due to missing nested depth limitation for collections" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-31197", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "discovery_date": "2022-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129428" } ], "notes": [ { "category": "description", "text": "A flaw was found in PostgresQL. This flaw allows an attacker to benefit from a miss escaping character and leads to a SQL injection attack due to Java.sql.ResultRow.refreshRow() implementation from PGSQL.", "title": "Vulnerability description" }, { "category": "summary", "text": "postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names", "title": "Vulnerability summary" }, { "category": "other", "text": "User applications that do not invoke the `ResultSet.refreshRow()` method are not impacted.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be presented soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31197" }, { "category": "external", "summary": "RHBZ#2129428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31197", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31197" }, { "category": "external", "summary": "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-r38f-c4h4-hqq2", "url": "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-r38f-c4h4-hqq2" } ], "release_date": "2022-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names" }, { "cve": "CVE-2022-33980", "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105067" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Commons Configuration\u0027s variable interpolation, which by default included several lookup actions that could permit script invocation on remote servers. This issue could allow an attacker to use one of these actions to send a request to execute arbitrary code on the server.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite embeds affected commons-configuration2 with Candlepin, however, product is not affected since vulnerable org.apache.commons.configuration2.interpol.Lookup is not exposed in code. Product Security has rated this vulnerability Low for Satellite and there is no harm identified to confidentiality, integrity, and availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-33980" }, { "category": "external", "summary": "RHBZ#2105067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-33980", "url": "https://www.cve.org/CVERecord?id=CVE-2022-33980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-33980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33980" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults" }, { "cve": "CVE-2022-38749", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129706" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38749" }, { "category": "external", "summary": "RHBZ#2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38749", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode" }, { "cve": "CVE-2022-41853", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2022-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2136141" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "hsqldb: Untrusted input may lead to RCE attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41853" }, { "category": "external", "summary": "RHBZ#2136141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41853" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853" }, { "category": "external", "summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control", "url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682", "url": "https://github.com/advisories/GHSA-77xx-rxvh-q682" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" }, { "category": "workaround", "details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.", "product_ids": [ "Red Hat Fuse 7.11.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hsqldb: Untrusted input may lead to RCE attack" }, { "cve": "CVE-2022-42889", "cwe": { "id": "CWE-1188", "name": "Initialization of a Resource with an Insecure Default" }, "discovery_date": "2022-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135435" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Commons Text packages 1.5 through 1.9. The affected versions allow an attacker to benefit from a variable interpolation process contained in Apache Commons Text, which can cause properties to be dynamically defined. Server applications are vulnerable to remote code execution (RCE) and unintentional contact with untrusted remote servers.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-text: variable interpolation RCE", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to carry successful exploitation of this vulnerability, the following conditions must be in place on the affected target:\n - Usage of specific methods that interpolate the variables as described in the flaw\n - Usage of external input for those methods\n - Usage of that external input has to be unsanitized/no \"allow list\"/etc.\n\nThe following products have *Low* impact because they have maven references to the affected package but do not ship it nor use the code:\n- Red Hat EAP Expansion Pack (EAP-XP)\n- Red Hat Camel-K\n- Red Hat Camel-Quarkus\n\nRed Hat Satellite ships Candlepin that embeds Apache Commons Text, however, it is not vulnerable to the flaw since the library has not been exposed in the product code. In Candlepin, the Commons Text is being pulled for the Liquibase and ActiveMQ Artemis libraries as a dependency. Red Hat Product Security has evaluated and rated the impact of the flaw as Low for Satellite since there was no harm identified to the confidentiality, integrity, or availability of systems.\n\n- The OCP has a *Moderate* impact because the affected library is a third-party library in the OCP jenkins-2-plugin component which reduces the possibilities of successful exploitation.\n- The OCP-4.8 is affected by this CVE and is in an extended life phase. For versions of products in the Extended Life Phase, Red Hat will provide limited ongoing technical support. No bug fixes, security fixes, hardware enablement or root-cause analysis will be available during this phase, and support will be provided on existing installations only.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42889" }, { "category": "external", "summary": "RHBZ#2135435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135435" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42889", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42889" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42889", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42889" }, { "category": "external", "summary": "https://blogs.apache.org/security/entry/cve-2022-42889", "url": "https://blogs.apache.org/security/entry/cve-2022-42889" }, { "category": "external", "summary": "https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om", "url": "https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2022/q4/22", "url": "https://seclists.org/oss-sec/2022/q4/22" } ], "release_date": "2022-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-28T14:39:27+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.1 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8652" }, { "category": "workaround", "details": "This flaw may be avoided by ensuring that any external inputs used with the Commons-Text lookup methods are sanitized properly. Untrusted input should always be thoroughly sanitized before using in any potentially risky situations.", "product_ids": [ "Red Hat Fuse 7.11.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-text: variable interpolation RCE" } ] }
rhsa-2022_5914
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Kiali for OpenShift Service Mesh 2.1 Containers\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Kiali for OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThis advisory covers containers for the release.\n\nSecurity Fix(es):\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5914", "url": "https://access.redhat.com/errata/RHSA-2022:5914" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "OSSM-1827", "url": "https://issues.redhat.com/browse/OSSM-1827" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5914.json" } ], "title": "Red Hat Security Advisory: Red Hat Kiali for OpenShift Service Mesh 2.1 security update", "tracking": { "current_release_date": "2024-12-18T00:34:52+00:00", "generator": { "date": "2024-12-18T00:34:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5914", "initial_release_date": "2022-08-08T08:16:49+00:00", "revision_history": [ { "date": "2022-08-08T08:16:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-08T08:16:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:34:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 2.1", "product": { "name": "OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:309776e1e9092e2e174bbbc09013c38d6bf7b487ab3ba39cdd9204fb045049df_s390x", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:309776e1e9092e2e174bbbc09013c38d6bf7b487ab3ba39cdd9204fb045049df_s390x", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:309776e1e9092e2e174bbbc09013c38d6bf7b487ab3ba39cdd9204fb045049df_s390x", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:309776e1e9092e2e174bbbc09013c38d6bf7b487ab3ba39cdd9204fb045049df?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.36.12-1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:c246a67d05177f4aef4bd0bc843b78784261982fcd2a740eb34cc1a3782302d4_amd64", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:c246a67d05177f4aef4bd0bc843b78784261982fcd2a740eb34cc1a3782302d4_amd64", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:c246a67d05177f4aef4bd0bc843b78784261982fcd2a740eb34cc1a3782302d4_amd64", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:c246a67d05177f4aef4bd0bc843b78784261982fcd2a740eb34cc1a3782302d4?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.36.12-1" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:7927047d06a5b7a1163c79999b0696d08cd0727ec9be36a52ad4f9dddde24f9a_ppc64le", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:7927047d06a5b7a1163c79999b0696d08cd0727ec9be36a52ad4f9dddde24f9a_ppc64le", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:7927047d06a5b7a1163c79999b0696d08cd0727ec9be36a52ad4f9dddde24f9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:7927047d06a5b7a1163c79999b0696d08cd0727ec9be36a52ad4f9dddde24f9a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.36.12-1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:309776e1e9092e2e174bbbc09013c38d6bf7b487ab3ba39cdd9204fb045049df_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:309776e1e9092e2e174bbbc09013c38d6bf7b487ab3ba39cdd9204fb045049df_s390x" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:309776e1e9092e2e174bbbc09013c38d6bf7b487ab3ba39cdd9204fb045049df_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:7927047d06a5b7a1163c79999b0696d08cd0727ec9be36a52ad4f9dddde24f9a_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:7927047d06a5b7a1163c79999b0696d08cd0727ec9be36a52ad4f9dddde24f9a_ppc64le" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:7927047d06a5b7a1163c79999b0696d08cd0727ec9be36a52ad4f9dddde24f9a_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:c246a67d05177f4aef4bd0bc843b78784261982fcd2a740eb34cc1a3782302d4_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:c246a67d05177f4aef4bd0bc843b78784261982fcd2a740eb34cc1a3782302d4_amd64" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:c246a67d05177f4aef4bd0bc843b78784261982fcd2a740eb34cc1a3782302d4_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:309776e1e9092e2e174bbbc09013c38d6bf7b487ab3ba39cdd9204fb045049df_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:7927047d06a5b7a1163c79999b0696d08cd0727ec9be36a52ad4f9dddde24f9a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:c246a67d05177f4aef4bd0bc843b78784261982fcd2a740eb34cc1a3782302d4_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-08T08:16:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:309776e1e9092e2e174bbbc09013c38d6bf7b487ab3ba39cdd9204fb045049df_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:7927047d06a5b7a1163c79999b0696d08cd0727ec9be36a52ad4f9dddde24f9a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:c246a67d05177f4aef4bd0bc843b78784261982fcd2a740eb34cc1a3782302d4_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5914" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:309776e1e9092e2e174bbbc09013c38d6bf7b487ab3ba39cdd9204fb045049df_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:7927047d06a5b7a1163c79999b0696d08cd0727ec9be36a52ad4f9dddde24f9a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:c246a67d05177f4aef4bd0bc843b78784261982fcd2a740eb34cc1a3782302d4_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_6392
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated host packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The ovirt-host package consolidates host package requirements into a single meta package.\n\nSecurity Fix(es):\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The hosted-engine-ha binaries have been moved from /usr/share to /usr/libexec. As a result, the hosted-engine --clean-metadata command fails. With this release, you must use the new path for the command to succeed: /usr/libexec/ovirt-hosted-engine-ha/ovirt-ha-agent (BZ#2105781)\n\n* A new warning has been added to the vdsm-tool to protect users from using the unsupported user_friendly_names multipath configuration. The following is an example of the output:\n\n$ vdsm-tool is-configured --module multipath\nWARNING: Invalid configuration: \u0027user_friendly_names\u0027 is enabled in multipath configuration:\n section1 {\n key1 value1\n user_friendly_names yes\n key2 value2\n }\n section2 {\n user_friendly_names yes\n }\nThis configuration is not supported and may lead to storage domain corruption. (BZ#1793207)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6392", "url": "https://access.redhat.com/errata/RHSA-2022:6392" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1793207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793207" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2105781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105781" }, { "category": "external", "summary": "2117558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117558" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6392.json" } ], "title": "Red Hat Security Advisory: RHV RHEL Host (ovirt-host) [ovirt-4.5.2] security update", "tracking": { "current_release_date": "2024-12-18T00:35:59+00:00", "generator": { "date": "2024-12-18T00:35:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6392", "initial_release_date": "2022-09-08T11:29:21+00:00", "revision_history": [ { "date": "2022-09-08T11:29:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-08T11:29:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:35:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "mom-0:0.6.3-1.el8ev.src", "product": { "name": "mom-0:0.6.3-1.el8ev.src", "product_id": "mom-0:0.6.3-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mom@0.6.3-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "vdsm-0:4.50.2.2-1.el8ev.src", "product": { "name": "vdsm-0:4.50.2.2-1.el8ev.src", "product_id": "vdsm-0:4.50.2.2-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.50.2.2-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "cockpit-ovirt-0:0.16.2-1.el8ev.src", "product": { "name": "cockpit-ovirt-0:0.16.2-1.el8ev.src", "product_id": "cockpit-ovirt-0:0.16.2-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-ovirt@0.16.2-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-host-0:4.5.0-3.1.el8ev.src", "product": { "name": "ovirt-host-0:4.5.0-3.1.el8ev.src", "product_id": "ovirt-host-0:4.5.0-3.1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host@4.5.0-3.1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.src", "product": { "name": "ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.src", "product_id": "ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-hosted-engine-setup@2.6.5-1.1.el8ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mom-0:0.6.3-1.el8ev.noarch", "product": { "name": "mom-0:0.6.3-1.el8ev.noarch", "product_id": "mom-0:0.6.3-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mom@0.6.3-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-api-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-api-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-api-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-api@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-client-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-client-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-client-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-client@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-common-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-common-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-common-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-common@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-cpuflags@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-fcoe@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-localdisk@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-nestedvt@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-vhostmd@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-http-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-http-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-http-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-http@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-python-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-python-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-python-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-python@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch", "product": { "name": "vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch", "product_id": "vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.50.2.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "cockpit-ovirt-dashboard-0:0.16.2-1.el8ev.noarch", "product": { "name": "cockpit-ovirt-dashboard-0:0.16.2-1.el8ev.noarch", "product_id": "cockpit-ovirt-dashboard-0:0.16.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-ovirt-dashboard@0.16.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.noarch", "product": { "name": "ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.noarch", "product_id": "ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-hosted-engine-setup@2.6.5-1.1.el8ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "vdsm-0:4.50.2.2-1.el8ev.x86_64", "product": { "name": "vdsm-0:4.50.2.2-1.el8ev.x86_64", "product_id": "vdsm-0:4.50.2.2-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.50.2.2-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "product": { "name": "vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "product_id": "vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-gluster@4.50.2.2-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "product": { "name": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "product_id": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.50.2.2-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "product": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "product_id": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.50.2.2-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "product": { "name": "vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "product_id": "vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-network@4.50.2.2-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "ovirt-host-0:4.5.0-3.1.el8ev.x86_64", "product": { "name": "ovirt-host-0:4.5.0-3.1.el8ev.x86_64", "product_id": "ovirt-host-0:4.5.0-3.1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host@4.5.0-3.1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "ovirt-host-dependencies-0:4.5.0-3.1.el8ev.x86_64", "product": { "name": "ovirt-host-dependencies-0:4.5.0-3.1.el8ev.x86_64", "product_id": "ovirt-host-dependencies-0:4.5.0-3.1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-dependencies@4.5.0-3.1.el8ev?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "vdsm-0:4.50.2.2-1.el8ev.ppc64le", "product": { "name": "vdsm-0:4.50.2.2-1.el8ev.ppc64le", "product_id": "vdsm-0:4.50.2.2-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.50.2.2-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "product": { "name": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "product_id": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.50.2.2-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "product": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "product_id": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.50.2.2-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "product": { "name": "vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "product_id": "vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-network@4.50.2.2-1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "ovirt-host-0:4.5.0-3.1.el8ev.ppc64le", "product": { "name": "ovirt-host-0:4.5.0-3.1.el8ev.ppc64le", "product_id": "ovirt-host-0:4.5.0-3.1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host@4.5.0-3.1.el8ev?arch=ppc64le" } } }, { "category": "product_version", "name": "ovirt-host-dependencies-0:4.5.0-3.1.el8ev.ppc64le", "product": { "name": "ovirt-host-dependencies-0:4.5.0-3.1.el8ev.ppc64le", "product_id": "ovirt-host-dependencies-0:4.5.0-3.1.el8ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-dependencies@4.5.0-3.1.el8ev?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cockpit-ovirt-0:0.16.2-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:cockpit-ovirt-0:0.16.2-1.el8ev.src" }, "product_reference": "cockpit-ovirt-0:0.16.2-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-ovirt-dashboard-0:0.16.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.16.2-1.el8ev.noarch" }, "product_reference": "cockpit-ovirt-dashboard-0:0.16.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "mom-0:0.6.3-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:mom-0:0.6.3-1.el8ev.noarch" }, "product_reference": "mom-0:0.6.3-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "mom-0:0.6.3-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:mom-0:0.6.3-1.el8ev.src" }, "product_reference": "mom-0:0.6.3-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-0:4.5.0-3.1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.ppc64le" }, "product_reference": "ovirt-host-0:4.5.0-3.1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-0:4.5.0-3.1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.src" }, "product_reference": "ovirt-host-0:4.5.0-3.1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-0:4.5.0-3.1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.x86_64" }, "product_reference": "ovirt-host-0:4.5.0-3.1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-dependencies-0:4.5.0-3.1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.5.0-3.1.el8ev.ppc64le" }, "product_reference": "ovirt-host-dependencies-0:4.5.0-3.1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-dependencies-0:4.5.0-3.1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.5.0-3.1.el8ev.x86_64" }, "product_reference": "ovirt-host-dependencies-0:4.5.0-3.1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.noarch" }, "product_reference": "ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.src" }, "product_reference": "ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.2.2-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.ppc64le" }, "product_reference": "vdsm-0:4.50.2.2-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.2.2-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.src" }, "product_reference": "vdsm-0:4.50.2.2-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.2.2-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.x86_64" }, "product_reference": "vdsm-0:4.50.2.2-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-api-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-api-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-api-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-client-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-client-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-client-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-common-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-common-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-common-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64" }, "product_reference": "vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-http-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-http-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-http-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.50.2.2-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.50.2.2-1.el8ev.ppc64le" }, "product_reference": "vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.50.2.2-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-network-0:4.50.2.2-1.el8ev.x86_64" }, "product_reference": "vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-python-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-python-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.2.2-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.ppc64le" }, "product_reference": "vdsm-0:4.50.2.2-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.2.2-1.el8ev.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.src" }, "product_reference": "vdsm-0:4.50.2.2-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.50.2.2-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.x86_64" }, "product_reference": "vdsm-0:4.50.2.2-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-api-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-api-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-client-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-client-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-common-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-common-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64" }, "product_reference": "vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-http-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-http-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.50.2.2-1.el8ev.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.2.2-1.el8ev.ppc64le" }, "product_reference": "vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.50.2.2-1.el8ev.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.2.2-1.el8ev.x86_64" }, "product_reference": "vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-python-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Agents-4:mom-0:0.6.3-1.el8ev.noarch", "8Base-RHV-Agents-4:mom-0:0.6.3-1.el8ev.src", "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.ppc64le", "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.src", "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.x86_64", "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.5.0-3.1.el8ev.ppc64le", "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.5.0-3.1.el8ev.x86_64", "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.noarch", "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.16.2-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.16.2-1.el8ev.noarch" ], "known_not_affected": [ "8Base-RHV-Agents-4:mom-0:0.6.3-1.el8ev.noarch", "8Base-RHV-Agents-4:mom-0:0.6.3-1.el8ev.src", "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.ppc64le", "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.src", "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.x86_64", "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.5.0-3.1.el8ev.ppc64le", "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.5.0-3.1.el8ev.x86_64", "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.noarch", "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-08T11:29:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.16.2-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.16.2-1.el8ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6392" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.16.2-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.16.2-1.el8ev.noarch", "8Base-RHV-Agents-4:mom-0:0.6.3-1.el8ev.noarch", "8Base-RHV-Agents-4:mom-0:0.6.3-1.el8ev.src", "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.ppc64le", "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.src", "8Base-RHV-Agents-4:ovirt-host-0:4.5.0-3.1.el8ev.x86_64", "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.5.0-3.1.el8ev.ppc64le", "8Base-RHV-Agents-4:ovirt-host-dependencies-0:4.5.0-3.1.el8ev.x86_64", "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.noarch", "8Base-RHV-Agents-4:ovirt-hosted-engine-setup-0:2.6.5-1.1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.src", "8Base-RHV-Agents-4:vdsm-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-api-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-client-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-common-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-http-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Agents-4:vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Agents-4:vdsm-python-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Agents-4:vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.src", "8Base-RHV-Hypervisor-4:vdsm-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-api-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-client-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-common-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-gluster-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-checkips-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-cpuflags-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-ethtool-options-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-hook-extra-ipv4-addrs-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-hook-fcoe-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-localdisk-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-nestedvt-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-openstacknet-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-hook-vhostmd-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-http-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-jsonrpc-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.2.2-1.el8ev.ppc64le", "8Base-RHV-Hypervisor-4:vdsm-network-0:4.50.2.2-1.el8ev.x86_64", "8Base-RHV-Hypervisor-4:vdsm-python-0:4.50.2.2-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:vdsm-yajsonrpc-0:4.50.2.2-1.el8ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_7055
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Openshift distributed tracing 2.6.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat OpenShift distributed tracing provides these changes:\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* eventsource: Exposure of Sensitive Information (CVE-2022-1650)\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7055", "url": "https://access.redhat.com/errata/RHSA-2022:7055" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2024702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024702" }, { "category": "external", "summary": "2053259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053259" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7055.json" } ], "title": "Red Hat Security Advisory: RHOSDT 2.6.0 operator/operand containers Security Update", "tracking": { "current_release_date": "2024-12-18T00:37:11+00:00", "generator": { "date": "2024-12-18T00:37:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:7055", "initial_release_date": "2022-10-19T12:55:42+00:00", "revision_history": [ { "date": "2022-10-19T12:55:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-10-19T12:55:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:37:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift distributed tracing 2.6", "product": { "name": "Red Hat OpenShift distributed tracing 2.6", "product_id": "8Base-RHOSDT-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_distributed_tracing:2.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift distributed tracing" }, { "branches": [ { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.60.0-2" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.60.0-2" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.60.0-2" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.60.0-2" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.60.0-2" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.60.0-2" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le as a component of Red Hat OpenShift distributed tracing 2.6", "product_id": "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x as a component of Red Hat OpenShift distributed tracing 2.6", "product_id": "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64 as a component of Red Hat OpenShift distributed tracing 2.6", "product_id": "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x as a component of Red Hat OpenShift distributed tracing 2.6", "product_id": "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "relates_to_product_reference": "8Base-RHOSDT-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le as a component of Red Hat OpenShift distributed tracing 2.6", "product_id": "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64 as a component of Red Hat OpenShift distributed tracing 2.6", "product_id": "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64", "relates_to_product_reference": "8Base-RHOSDT-2.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3918", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2021-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2024702" } ], "notes": [ { "category": "description", "text": "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-json-schema: Prototype pollution vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "RHBZ#2024702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3918" } ], "release_date": "2021-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-19T12:55:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7055" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs-json-schema: Prototype pollution vulnerability" }, { "cve": "CVE-2022-0536", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2022-02-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053259" } ], "notes": [ { "category": "description", "text": "A flaw was found in the follow-redirects package. This flaw allows the exposure of sensitive information to an unauthorized actor due to the usage of insecure HTTP protocol. This issue happens with an Authorization header leak from the same hostname, https-http, and requires a Man-in-the-Middle (MITM) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Exposure of Sensitive Information via Authorization Header leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0536" }, { "category": "external", "summary": "RHBZ#2053259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0536", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0536" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-19T12:55:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7055" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Exposure of Sensitive Information via Authorization Header leak" }, { "cve": "CVE-2022-1650", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "discovery_date": "2022-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2085307" } ], "notes": [ { "category": "description", "text": "A flaw was found in the EventSource NPM Package. The description from the source states the following message: \"Exposure of Sensitive Information to an Unauthorized Actor.\" This flaw allows an attacker to steal the user\u0027s credentials and then use the credentials to access the legitimate website.", "title": "Vulnerability description" }, { "category": "summary", "text": "eventsource: Exposure of Sensitive Information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1650" }, { "category": "external", "summary": "RHBZ#2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1650", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650" }, { "category": "external", "summary": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", "url": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e" } ], "release_date": "2022-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-19T12:55:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7055" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "eventsource: Exposure of Sensitive Information" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-19T12:55:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7055" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-19T12:55:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7055" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:19b497addaa9210f2b2048421a5a8ef1a8748bbb0884af10e23c59473dda544b_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:2089cab411ac3fc66784bacdf080ed6ff51d0a4450cc7f246915e96ed6cf8665_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-collector-rhel8@sha256:9bc1969a7862230282b9f8b902906e51cb0fdb3e3c368579a580eaccaacc7b03_amd64", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:3ed70e814b9458affbf3ad5057a741b9f453095220c6548e2bd2960a6cdf6314_s390x", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:6c35a77e6118ba050a01e0dd5f0f6cca20211ac513cb4d92ae4058f78459610d_ppc64le", "8Base-RHOSDT-2.6:rhosdt/opentelemetry-rhel8-operator@sha256:74d8fed59e7ed6389bfbf08bd6279b035f18fddd82056f597e6d34ccbb99c865_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_7276
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.8 General\nAvailability release images, which fix security issues.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.8 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs. See the following\nRelease Notes documentation, which will be updated shortly for this\nrelease, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/\n\nSecurity fixes:\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* nodejs: undici vulnerable to CRLF via content headers (CVE-2022-35948)\n\n* nodejs: undici.request vulnerable to SSRF (CVE-2022-35949)\n\n* terser: insecure use of regular expressions leads to ReDoS (CVE-2022-25858)\n\n* search-api: SQL injection leads to remote denial of service (CVE-2022-2238)\n\nBug fix: \n\n* RHACM 2.4.8 images (BZ# 2130745)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7276", "url": "https://access.redhat.com/errata/RHSA-2022:7276" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2101669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101669" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2121068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121068" }, { "category": "external", "summary": "2121101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121101" }, { "category": "external", "summary": "2126277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126277" }, { "category": "external", "summary": "2130745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7276.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.8 security fixes and container updates", "tracking": { "current_release_date": "2024-12-18T00:37:19+00:00", "generator": { "date": "2024-12-18T00:37:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:7276", "initial_release_date": "2022-11-01T19:46:29+00:00", "revision_history": [ { "date": "2022-11-01T19:46:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-01T19:46:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:37:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.8-16" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "product": { "name": "rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "product_id": "rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "product": { "name": "rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "product_id": "rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "product_id": "rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "product_id": "rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "product_id": "rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "product_id": "rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "product": { "name": "rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "product_id": "rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "product": { "name": "rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "product_id": "rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "product_id": "rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "product": { "name": "rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "product_id": "rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "product_id": "rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "product": { "name": "rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "product_id": "rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "product": { "name": "rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "product_id": "rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.8-2" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.8-2" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "product": { "name": "rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "product_id": "rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.8-3" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.8-16" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "product": { "name": "rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "product_id": "rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "product": { "name": "rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "product_id": "rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "product_id": "rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "product_id": "rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "product_id": "rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "product_id": "rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "product": { "name": "rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "product_id": "rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "product": { "name": "rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "product_id": "rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "product_id": "rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "product": { "name": "rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "product_id": "rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "product": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "product_id": "rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-agent-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "product_id": "rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "product_id": "rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "product": { "name": "rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "product_id": "rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "product": { "name": "rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "product_id": "rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.8-2" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.8-2" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64", "product": { "name": "rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64", "product_id": "rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.8-3" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.8-16" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "product": { "name": "rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "product_id": "rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "product": { "name": "rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "product_id": "rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "product_id": "rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "product_id": "rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.8-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "product_id": "rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "product": { "name": "rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "product_id": "rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "product": { "name": "rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "product_id": "rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "product_id": "rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "product": { "name": "rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "product_id": "rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "product_id": "rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "product": { "name": "rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "product_id": "rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.8-5" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "product": { "name": "rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "product_id": "rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.8-2" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.8-2" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.8-3" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "product": { "name": "rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "product_id": "rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.8-3" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64" }, "product_reference": "rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le" }, "product_reference": "rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x" }, "product_reference": "rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64" }, "product_reference": "rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le" }, "product_reference": "rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x" }, "product_reference": "rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64" }, "product_reference": "rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le" }, "product_reference": "rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x" }, "product_reference": "rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64" }, "product_reference": "rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64" }, "product_reference": "rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le" }, "product_reference": "rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x" }, "product_reference": "rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x" }, "product_reference": "rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le" }, "product_reference": "rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" }, "product_reference": "rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2238", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2101669" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the search-api container when a query in the search filter gets parsed by the backend. This flaw allows an attacker to craft specific strings containing special characters that lead to crashing the pod and affects system availability while restarting.", "title": "Vulnerability description" }, { "category": "summary", "text": "search-api: SQL injection leads to remote denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Advanced Cluster Management for Kubernetes (RHACM) the search-api component is protected by OpenShift OAuth which reduces the impact of this flaw to Moderate. Access to the search-api where queries can be submitted requires the user or ServiceAccount token authorization with a granted access to the resources and managed clusters.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2238" }, { "category": "external", "summary": "RHBZ#2101669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2238", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2238" } ], "release_date": "2022-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-01T19:46:29+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "search-api: SQL injection leads to remote denial of service" }, { "cve": "CVE-2022-25858", "discovery_date": "2022-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126277" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the terser package. Affected versions of this package are vulnerable to Regular expression denial of service (ReDoS) attacks, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "terser: insecure use of regular expressions leads to ReDoS", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Do (odo) product terser is shipped only for using in static page generators for upstream, thus this represents no security risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25858" }, { "category": "external", "summary": "RHBZ#2126277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25858", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25858" } ], "release_date": "2022-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-01T19:46:29+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "terser: insecure use of regular expressions leads to ReDoS" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-01T19:46:29+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7276" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-35948", "cwe": { "id": "CWE-93", "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" }, "discovery_date": "2022-08-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121101" } ], "notes": [ { "category": "description", "text": "A flaw was found in the undici package. When requesting unsanitized input on content-type headers, it is possible to inject additional requests via Carriage Return/Line Feed (CRLF).", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: undici vulnerable to CRLF via content headers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-35948" }, { "category": "external", "summary": "RHBZ#2121101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-35948", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35948" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-35948", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35948" }, { "category": "external", "summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f772-66g8-q5h3", "url": "https://github.com/nodejs/undici/security/advisories/GHSA-f772-66g8-q5h3" } ], "release_date": "2022-08-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-01T19:46:29+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7276" }, { "category": "workaround", "details": "A possible mitigation is to sanitize user input when sending content-type headers.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: undici vulnerable to CRLF via content headers" }, { "cve": "CVE-2022-35949", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2022-08-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121068" } ], "notes": [ { "category": "description", "text": "A Server-Side Request Forgery (SSRF) vulnerability was found in undici, a HTTP/1.1 client for Node.js. An attacker can manipulate the server-side application to make requests to an unintended location when they use the \u0027path/pathname\u0027 option in \u0027undici.request\u0027.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: undici.request vulnerable to SSRF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-35949" }, { "category": "external", "summary": "RHBZ#2121068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-35949", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35949" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-35949", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35949" }, { "category": "external", "summary": "https://github.com/nodejs/undici/security/advisories/GHSA-8qr4-xgw6-wmr3", "url": "https://github.com/nodejs/undici/security/advisories/GHSA-8qr4-xgw6-wmr3" } ], "release_date": "2022-08-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-01T19:46:29+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7276" }, { "category": "workaround", "details": "Validate user input before passing it to the `undici.request` call.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:32c9fc3270f92f52be7a3d6479cdca9627c4b2be5f37a4ffb5854547558d01f8_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8ae58edede22501d2651155da21fe094ce1997db8d8c7ee260585d022bab978c_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:d947f131cf3527bee24fde95e9578eda977272379a1b9b25bbffced0b7ab7265_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:10f91c9e714089b291330d879bd6f08531eb5e567c20e5b40dfe8effe8fcd6a2_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:4907fefef6d2427d07962aae5169792f65d1fd8f3f3c429601eb12c0fdb33dd9_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:82af465c0a9a6ddcee4b6f783220713883168d893a5c30e3d20ecdd1f7bd9212_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:00a4bbaf666fc9e26859459a2ce30b92e02aa93c9873904f6d1177f135c369c0_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:4e94fc7c80275f1b8f493a7cbbab5a9f39f8a7e031c1b6680862bc6bff0cab09_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:c8f64cdaf49247d26449e5012a0b9d6bcb3ccce53a2881c92a05f0de8306d343_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:7310607371b23fd401dd11a4d8f169cef64334a98791ee681a8e51dc4aa40bd3_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:ae7845898166d8cdcfe2f49d9c4200aaa0a448f8327c1d9568a18b2640c04603_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:d9c728866e1157b778230104de59f23a259defb918b3f414c6278ec9e95d342e_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2f1b3dc0f1d9283f24b6f898afda438d132e983df4442b8929d4a396083474dc_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b444dc2df0d109616ea92fd6b321ebddb7f8063e88e771419103433002f385e2_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:dd107ca4320aee4d2013d87122aa31714a4b3501118ad492e3ee3822006e562c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:0ed96b5d322932db657a64014496c1f1563de9f21f049becd59b86d976caccec_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:7dbf8df5f88923a7db313f88c58e3c5e89437c5960b6f799cdfc84464ee9cffd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:ed2204b626cbb894e65c1fda7b586fd30f549317b01373760bd8658d1ee340e8_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:052b87af33c5dd5592f6db7b201e659ccf28e032c694dc79980895d1c35a15b0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:07186a9834372812fa53960b64389fbb3fe38bf26c9afaa962600250be8f4e5d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:6770b5d671bfc7dacf9530357e8009d3536bf9a3b5138adfca7a514433f7bf2d_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:32d927f22fbc42c1dca7875d3e757bcf30fa70f52810eebc94a406e54a80fb48_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:c425f828749fd87ba2d7c3895ecd97b75c0266158de71d2ae4ad80b886eb8e19_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:01ab599a419096a0552709adf5358e76265a1b638839ca049b6bcd13c9bc98ea_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c1e1092e74ec93df9b34e5d625305ebf7992a9fc574e083697f482555eae5d4c_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:d533bcea3145211d2aa43eb8c445d16d281684c9f56b32be0acc7dc91887668a_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:1226ade84292cd94ded87275fab0541f9951b18b1237581c9d7a0548f14d1e43_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:821b1abfe1bdec20194a8dce46dfce6e55c6afd02dc061f41d0ad408759204a5_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:cb0559f03e1c60c31e77376a3b936cb8a35ad6144841549018e5ba274ecd7933_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3bb13f7b9de884457d7ed0891bb6e46e903d578bbb61da5b016f48adeef9f113_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:3cdcfad670f528b7d2c252b2925ecb810c3c844e8d92acd8f7d4768f3b8a9ce1_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:d3d3b15908ee325dcb3ac2a5d270a153ae0f8e78736869f016d72dbe62190c86_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:191c9c280d15ff65d206ae94e038c6feba67760b6feae354986cc42595a93e89_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:32b53f5aa5b5d1a0e68b5cc08ad215fa5ea91659f6ad01ac3f1b88940dd5ed9d_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:50e074e4c8baf582b886727fe5180a12fcc0a5a3da1d02996aaacb8c225e08e9_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:657aefd5c78386b25793c16a98545b2597c5a0899622990043f68a9f41948b72_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:8db5e24ee30847921173ae3050bc2e0aaf07b9decaeec5f043bbbd8aaa8e1cfd_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:ae1d3dad661df287febbce9cde877caac3169a07cfbfcdd020689c4e9bed56b7_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5f480578f5073fef7f65801e7f845e6a3045b8fa1d1e6cd4d5e64bdc3ce8e007_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:d2c5474848a1202fb7eeb2e08632707d32b965dc273317bdda10d5c01b2e2593_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f86978425427d65f6c2c42d374c16ed50e28be8983d1a6acc6eec5674d576fa1_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:4ae9b19f779bbfaefa1fbe50f73512b08b6e9ab6bfb70ada6f2a42153d5dc96c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:ef2202eca66b28836ed657b0dc65b49724a29a29fb8cd0f1069a20cb86115848_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f067e7433dc6f4d7c31010a970db5bf676caab95fd6b1a12377ad7337a65ed5e_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:a89a6d67f83f83b639d1c00acaec846add6c4e4f9a975f38068c30911e686a2a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:c1ab80e820de59acbce7b35764af0a4d3a81a07a63f8ec238dbbb62ed103d200_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:db4689522168982655615117f4321abfdf250bbe868817fb3fb68ff7ca93c961_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:13dc1e39c172f23f5a0731f7754211ecd8d9fcd64ca4d037c5f90c7e2197dc98_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:560d05a7239ae1e70083fea16eebe8fbade8f23ad0f5e5a9d13b82630b5889a3_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:794f5eb53a3cc9e2c4f23a9ac24e40f41af362a1eae6c9bb1ff316a2db613756_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:4bde8f661f7feb27ccc21224ab7363bf67e4b7e245acc627b938b10892e5a948_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:9b199e70daa25f20b84aeae6f96df3114823d0cb53064160cd229dbfedf39277_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e781e3485395e7aa927b6fc75de0ddc24218151aaa87d29fe8ffa91c3ff5d6ae_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:37fb13575e208ddd4dfc30d2d0dcd6fd28a1048f79c73246aeb71664bddd3978_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:70461fa79041832d5fdefb39f4bab18c3cad47f155ef38c346362a6d8e63bbe0_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:fbdc73eb20270cbb8002d22c8f10a461ac73cd78b937ccc730961d4985e0df9c_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:411fff327b55318320df08fb092385891435d2addbe3d28c72e90531ce9eda30_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:a7266160ac78ef496abb0a6203f60633523836a6992de453a58dca0ecb744d9a_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:dadc81d2fa4d258becac24a8fe3230c73c5b8f2646d4c579189d154ae18953f7_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2d0459d9280c3dbf7ed426e06a262a07fc59555b6853fff3c209f472113513fa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:8a65336671b021e9c24e72f363f64da1d8826af4ffb8c0ee8a698746ff8ac513_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:97fbd15ca9079f07e4c5e31f93d41e699ac195b94134bd95648a5882e8588089_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:5bfc9a8a4c73bd57395e8a7a2b0113beef584fc08dbcd1f07ec37347310e1d57_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:78b1424c742b1afef3409978a2c7372b0b3fa457b0ae2dc014db484f29cdebd0_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:a985b9f7f02f7042c15b95c5fe488061c64d999d266e56baef5d40a3af2e33d5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:3c1b100b6bc6ed1e8d1185b70ca290aab40b570d1a4ad2ea5ed68695be2dfb66_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:c58f2468c536527de1c669c0d851646ce30bdf00a303b42483a9425c30deae99_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f4de01d657c806a58a2145434e0e4ab81a9f58b701fcd2265bf9b9ecbb47214e_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:95dad2b96982c6269cbcee84592182f6dc5e68023ef70fbb187821771234c6c5_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f62b16acc6b95f0efa4ee36be66a7f7e07484402fc4aa15bf2560ed3f5caead9_s390x", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:f80a6b990a90e8b91d702e2021af913f30a04787fea0402ba87c18fec15ddacd_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:18ce7de3ecdb08ce0bd06f3a94760133043bf881c746e448798c1836fea1b263_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:325638ba1cb87b85dac0c3e2eb483a6f47daa58304ed361679c17c7c466d2d06_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:602dfca08e34fc4f161c8801787d689210ac28cc220920bd6a35dd54d4da3a46_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:01146a816db0a7f0c3facae45b6f45df255e94b45224f9c56a63a58566b46dd6_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:8949998bedc18fea3441d36f1b9bf0e0109ed24de760c2313c485620e8e9f676_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:d2d4f6caeae99f6fc67a05e10a70857e90187e18c46f074a320579336137b057_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0224a2a5f214b8142022807e983aebbed991ea45819bea4c051e85849c268029_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:11a7de8cbd1b8a1e5a44442b8f9e9a5d72f5f05f37073018ce70e48d20cc3dc7_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:54ae484fc62d6f6f80271d009f0e6dc963b6678c610ff50e9a296d4a7bb14fa3_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:60dd186dd4f2b5b5443fa07bedc087021e86c6d896527b1886b5618b891f458c_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:9710f8f87446f09d5f15c913cfe4134303d5745a52b7022d65a64b8d2bc454dd_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:ff35a1cb8910086d4d3b8e1a96cc9ac0898c8900fe5fc4f675816201bb08f9f8_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:3cb1a7d1ea2f68c7b99764684b536ea32506c7f3bd22e44f6eb801dd006fee29_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:50adf0d0db4d45b9d18ca32aa0d78759cc83cc2ec47dc306375a5ab58490e751_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:73b18032050b14d3d934bffb75881cb957e319a98060aa04390c5876c8eafa2a_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:95a3d244961b00d485d39122d56e63f6120aae7bdbbf0b120ff3686262c995d6_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a3f7d4b70597922604bb0b17e540086e2bab161d78926ee4aca4b18a96285307_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:e7799ebaabb94643651243fe3ccb2f4d797d27eaf1d6408fcd821b96061f8c21_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4056c6c032d3b68d31f5c151035fbf1879ab92c857d1b681717fd413cbcb504e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:c9145f2ece733429ebbf1fd685d74fbd8c93004c1dcc1cc3b3bbc8d909ecb601_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:e76355950fa88ff3f061b323d1825236f7eff0741067bbcf9ac41bf321577aef_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:10ddba0bf37b616c569f277a29a9b25b282d8df8472a702705e742948b718d54_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:42ac4c568338a3618452d739372dd7a64ec1b64839107c09bb3d650a75e3a8f1_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:7eff13e65c57d60f9dc2f34aa2cdfa04bdeafef231a3f325cbabc08fc6a2f5ce_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:89ed9e849531c4c4896f3d0b933faeb09f28d93228b21e13830cb7317818a082_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e549b9d8fe3b7c5b3011af5d5cb8301939804f5212845e48e8dd130af155d106_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:fcce95855a894d74c5b3a096dc327b873dab7bed08c8949133d87058ab1ff402_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:4d3c2da2a105d6053248b2b4f5cd9850d61050ac5df82d1ebd787f9ea7ace86a_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:96e2a59d704e9395690bb948b562a74d793a7ddfc7ac0bb688af9934ba55f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:a92173aff85efe0c92313db2017068fa060d8a08d8867d515ece15bede4f5b15_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:231c1c0729f21a86fef11c73c79c1f0e52214a39d3ca755a66c1d37dd47087f5_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2cab079a51e86f0365151707ef6efb93d4cb4bfdc2c0a450d83437f364e2425f_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:6ec2c28c574f945881e07619e6fdf0e12bd66d0d2fc5bfaed4c49061b70a57c3_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:3b6c371f99e63f1d2844d0956ce256d063535be11c4819d4be904312753a3825_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9bed178e476034fa1e036b3001773bd9b200a2025084676e20f7ca5d72c7350c_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:a11feedc184f76ca7e873577931e447105f0b4fec82dcbdd82510c64604fcdeb_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:04d4d7b843498a216a71e4f9d071d859ee5fd020f8bcc20645a8bf46a9d05916_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:4910556b7029dc686efc6ba1388366c1ec271aa9fc4a621bbaac26740219e7c1_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:6cf1edeb07e6fa79a1e4d66341f72e5ca45cb7fb7fa88dc491e48a23b768d06b_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0640b7b591fc721c4eee8b5d67e581169e7a9732eaad14f9d2db5e9421d2f216_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:06c48e218435f19aecfddc15fa3b082432dae00f12209018c5b443e8a6679959_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:bcbb98fd2f4dfe1471749665671eff239a691fe9fbb03fcc60afe69ab3b2457a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:381f1a513edf9ab366b92a4a03deaa09de8f96b771c86927521e63487112db5d_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:43bffb986bbbeb7e8e7504f00346545170af01b52a0d33a3bdd3af18f12338b5_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:4d42793b8e1d5e642e0ef1271e5d1a0bedbbfaa61933558c412fd03d21b36471_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:6bcfb3260612e0e7cf4833c6a4f873c97f35a02ca14d289fffe57fb8cc5e16ab_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:afc2691efb882c5c07a0d24365bbffcc44153cd3243aa70d211db9a6cb57e19c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:e5b5979f55142cc57518a8c6e66b90a4e766c3d0e8f2f4493771d3ebb82d2f7a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0af0aca479f6670b562882545d4d542f7a068aed2355bb2bc8888343b902f2cc_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:0f503a808655cb8382e1351e1810b3a575db54f9b425637a65e6743daae0e479_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:46235794f1c8e7bee3b35f95a0c1b4cce1d70987b48d55925eac4d2c8d1d8d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:02209b7ccb537ae084018512da601fd3363c33010d10f5e81adce294a5a08a14_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:6531f1b08dca544cb1183b1a77a6c15b87cf38c55c9f56827de3eb0c83d1cf5f_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:bdf6d43ec634ef72329283856095a4001cb9ab53aabb3080b3b5385113d8bcd9_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:36f9d01e67fec70a5a1641a9b2c5862c6ff09d0dc9ed914df0b9edf3798747a7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:bfd0c333e8a5f834f2eec948209da932f03378b3cffb7091524cb3496675418c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e09f809361c6a1c99f28bd149a3551cec5ed1583507de180fbcb91c509847748_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:21405730da41f7189a30727067c655a88a23ba7dd41d13d7d7a842699ea3afd6_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:4cb6adb16bca8a109b1171904d79c6867225aa7cb53f2ea8e8f028de40f130f7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:5fc90e808d20d2d47cae5fd908940ca30adc06e7482c3cb077b024d79c8e7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:27d9be23e6f81da2ee3014a8eb1704f7d97dcadd7a2ce8a4db48b7c50a1f562d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:3daafd5ca233b3733bcfe324e8cd48a9791a8018d2f4bcf0254c3ffd3f11a63c_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:a69ca5d013a9f8cc0a1e7b45e96c2f7cb31a8232661643185bdedfc0f458a177_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:7957e99ea9d2b47fca9d6e3fbc34bd6167aabe370560e110208cdbff2a2e6b3c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ab6467e71011c4fe3b19ce7ac00fb21ac19027804b5c0119c6b09a951ec2c159_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:d8181ce21267cab606a92813fdc846d2521fbb01c15b644bbc956b75d5100c57_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:3de848f189c7875b263bd12f964b1b4b30ad0a371eb0ed106565071c5778ac3d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:44930d8d286e0db009dcbb44b26c630ea5fe430ccd65fc9404129a56be220e0b_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:d283946f7809b448300c090469ede2fd2e111e9a65f618a296e6a68f5d014bfa_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:929a19ecbd80f0c928b9b7e1852fb00f5fc683c575f53cc12ebeaa5c3d4a3cab_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:b561c4a50c6fe526e38ecd5dabc51c1a788a31fea5eee3319455c0ddefbc6a99_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c53145190d2fb3c27bbb030311142d214bdc27530a75a8f1c0da649909e197ba_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:02b7f62bebb81cd3ea5806c136d204eb22875c3175ebb14086304769393dc6ea_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:0689509be38d8a05d20accacbd8d6a3f1e42cb11f1716accbc1edd2b26940ffe_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:7a6b528d838f360ecdb3972a408dab5291e09ec0cc19f804d847fd159a389d3b_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:1c683214b7e1495b8652a7936022366623ec9ef8774c5839ef21e837baa998a2_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:917cfba6fde327672eafd1061f4d0b5eacf330d66d0d57ef8817b220f9eea6ca_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:d6511ec34861a4a8bd71a6392fe22d1f8484a13f8a6917de1f5045eeaecb5c87_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:cfa543ad763ffca3ad08d1b0ab587a4bc54b81434cc0650a12d3f4623a3f072a_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d066c2db98c462ce2bdfd5396a8615d266f52ed8546bf517ef0f4804048fc194_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:d8d900499630908a22df80f63b14b97da9148d1dd41f3ea835315e7912e8cc1e_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:07c1b4d516e009581e4ec6e10aee5a3ce96d7b5a96f523846532624803e593cb_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:ab7c977e16bee222741ecaaf33ef1c5f977eaf27a0f8cdd7ee6bdc3e39889e14_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:b3f85ad78513226ccbb285c5f69c3d4f06e5491e4c4b526c5a91e40ce801e176_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0dd971bac05d141385773016abe71e4cc9b5dc0ebaa0c30578700e57baca37f8_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:3f605c23c7a788a89dad1835bccbfb7b5760cae399d1e1e153837065721c8879_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:865b5e310d3742a7e4b700fead0249ead9241c8db359250eb6c0ee72c7d2b736_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:48d59b9edde75f28f9c155ae7ae8fc9e5be5129af3514fd963aa2152a2383c67_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:8e89fff487590986d0c27c458019fddae9acb7b66a9c50920c3d0cce31a7153c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:bf8d218058c60fdf97de628dd1ae4088791235976430d434676719cb0662c37d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:080146c562f1cc7e30debb259feb0a6a9fbc30acad2f1e5b7a5a477e820e26b2_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1101e21827ce2bc938c35e6775a9c7504c83c1afecbe75de3b61377ffcd9d816_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:d8d09933a8b39aa964edcdd0aa0c5696089d28140c7a483d51767e211c9694fe_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:69f92cc65e890baf48fbcf3617feff86795a5917a6340977daf1e9903b0ff84f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:756452044c7e82d1dd0df012a09f67265aae67910ad688098a2a91b81d624e93_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:ac7ab93692b918497f6779d8e1a40ad2280b6ffab4beaff0d0f2e63946c52cb6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:0395e1c3ef80301970bba9f1cc3611a4c3e8e34aacb292fcda02661a72fb271b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:69701abfa8b1d743dca559f6a9faef7a9e1600b3c401b3b9d8518c5d730a32d6_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:706c31bfd2a3fea8bc2daa5f2c5cb72bcc88e9589530bc1e9e118dfedf65565d_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7f0846467d8ea8d0b8c7a5aa023826d7714b06982b5b8e75797960f844d97442_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:89081393a8362f80ec2280f0da220a9909b5a2ea08a6edfe21a8557621c94c8f_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:c54bb112e665709bb966df6ac4f77a2c8281a3984ed253fc661c51513c2589e4_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:3924195f987335c19b8b07d79e0c222568755631f63a656e63fa2d29b40b455e_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:afb8138b77933915fe30332a7a5eaec37a50d6cec94b6950ae2c3e87b940ac9d_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:f0fd6b2a46e1fe8cfc61150767f5c48bf0e4c069e0b902425e160acfb64270fa_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:2ca23c45ac824b40380749dd8761462789a16bc300df416f61deb5ed968d0f6b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:487a8068b02826d51da0b51e440f937d45c40ad3659097e76c1f86f40644e774_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:c2a698340e579c82cfec299464237e8c4db6f6fc459de0059d1adf0a4a7285cd_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:73a0aeeb2cd4b03854d09004a6b0291a8a900ba663650a82523fb08e2b3dae72_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:87a9de7b19ac2f6af88cf6e20a6630316bd1fe93ac555af909232d7bbb75c228_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:f9871e12259fa2b0deb75abb0a9852fc8eb6ca6e66e920e63f5b7cccc038db64_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:929d1920c402cad85b6b1087cf9fda85b462ec47863b4fc4484989bb6dc446aa_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:ccb7fa3acc502999a374376ab1918fe5957800f779d5a03a7ca544e6ae06cc7d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:d9d949342640ac7e3a6cdf49e8885be1da6b86cd4f2c5a019861b3d335791f49_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:678d932ddf7f29f9ae59abd93555ead34799f188feee00f1ebb3d7f428189402_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:e5ddbd08d5687a13af236a5b1980f845d470ca57e4e095e0ea8e379c8d5c5a5d_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:faf1fe6ddaf8f67bdacb41c084e95a7b429cc34bec3285955b1ec672f11774b5_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:07a4dc970b86785e6845d4c7aa0824321452d19fea25052993a85de47df77703_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:28e8d1d581292ced33f8e7126441b7a00aba07677165642a26bc2538418ffb41_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:549dc362d7dc08564fa8d4062d6b20ab43034d16e53265eab5af4dc004a8fde7_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:7968d82d6eae8e9381a414a0c0074c7d6a9883bc17e5a120b920cc010e89f95f_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:b698be80268aac47cd50fe7e2f626399e546ba7ae1ac456133d014e32c955ed1_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:d2ff9a230d66ccacb5d6cca873008ba8625968cbc377c5feb405de24006c1db5_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:4a566ae4eb6e2200abe26d6915e50a6acca0626c5c5f192360aad67a2c09035c_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:9092b0fdc4a0914a76795fe1554767d35dd1e9497b985095c4a3a816f84afeef_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:c13c9e3b4d570903ec57ea46930580db37459b4374294f23defa67d05b3572b6_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:66aa4ecd457e9916ea6173f6dba10f98b077be93ebced7b67c52859b394e2a74_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:f2995ddf6d561e3777f4510d51b8e60fdd3aeacde356c36e942bc18d7ffb11d0_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fa61f4ec40c137ff16b932f56ef2afe1d2dfe52f636d1718f078e4dc56591246_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:55e0fd04826b065eaa990031ce8b110c021299dee72b432f66f743f01d1d8228_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:81b27dad3f889c0afccc2786b1107bcabe663b1547ff676afb6d41bd65f24b28_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f72b05ad3ed690c6f70d8c2ac9754d33d334e234691b088ff7ac9540ebc784e9_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:08d271440c91e7d28083c20cef01f4b3cdb97c2deb57b0da16bef9486fff49cb_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:eca9e75f1a70ed57a925d1258060dd07b68e957a83d0d88cf878f8050a1a2d89_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:f31eeaf789871dad496206cc5df1ffd8b53fee60e135243f6519c40ee20b6572_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:08dfec54406c5e17c0a4c174d3451d9e3b4c8e480cdcde0941bc2e0017cfc171_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:62c0f5a2e29f6d2c36d01d973c720549a3a94ad9f3ff0ae3e820421b25ba63e8_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:7ff3dda6f4d5cf7a8cf66ac984ba9de6dee43510044293e07a5df8f3bd60c3b7_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:24579a26ad25e2ce0ce15cc02984fae41430fb1a33062b31dfb4aaf564743088_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:429d6bc589da7813f82d780bf94dc69161c2efb61f2198e471689daaf9dbc013_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:a61e18b5156b300bfa450f873891ceb2c966455b7136ced295c5673ee2d93288_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:1911b33c916650a025e65f91aac5c921c6519558cbad622d95e5fa2bd3c91b02_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:42ae799d386d45fcba18b7a00a8618badd92c39e5aa7fedf5dafe2935a00138b_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:4c11352c9902cf392e0807cf87766c1816a983412e6887364ef85e9519c5331b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:427cc373a77bd38b83e2a07b484f8276134839fafe7d475747c75883c9949705_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:667da6d4c2930947864a9317de8f551185f7463cbcd3dabf9b9c38bb5abe239d_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:91fb4f76def407e58e583e369cdd1be5ac2c8be86e3a1b3102258483520bb582_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0665de24947b6f71e0f42784f279292b00d6a02b070bbc6fe80fbd9319208712_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:14460282e660a3f239b503414d8b3a37dc7c68b2c9b3a6764ec2140aa0819fbf_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9481490b72e6cc4ec6646ac29ab3fea3a63bbd6f6bd6ea1ec1fe8f8af09e2646_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: undici.request vulnerable to SSRF" } ] }
rhsa-2023_1045
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.6.2 packages are now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.2 on RHEL 9 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: XSS on impersonation under specific circumstances (CVE-2022-1438)\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n* keycloak: missing email notification template allowlist (CVE-2022-1274)\n* keycloak: minimist: prototype pollution (CVE-2021-44906)\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n* undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations (CVE-2022-2764)\n* snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)\n* loader-utils: loader-utils:Regular expression denial of service (CVE-2022-37603)\n* keycloak: Session takeover with OIDC offline refreshtokens (CVE-2022-3916)\n* keycloak: path traversal via double URL encoding (CVE-2022-3782)\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode (CVE-2022-38749)\n* snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match (CVE-2022-38751)\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject (CVE-2022-38750)\n* keycloak: Client Registration endpoint does not check token revocation (CVE-2023-0091)\n* keycloak: glob-parent: Regular Expression Denial of Service (CVE-2021-35065)\n* json5: Prototype Pollution in JSON5 via Parse Method (CVE-2022-46175)\n* keycloak: keycloak: user impersonation via stolen uuid code (CVE-2023-0264)\n* snakeyaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n* CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)\n* rcue-bootstrap: bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)\n* jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)\n* sshd-common: mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)\n* jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)\n* jettison: parser crash by stackoverflow (CVE-2022-40149)\n* jackson-databind: use of deeply nested arrays (CVE-2022-42004)\n* jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)\n* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)\n* jquery: Passing HTML containing \u003coption\u003e elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)\n* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)\n* jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)\n* CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363)\n* keycloak: reflected XSS attack (CVE-2022-4137)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1045", "url": "https://access.redhat.com/errata/RHSA-2023:1045" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1601614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601614" }, { "category": "external", "summary": "1601617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601617" }, { "category": "external", "summary": "1701972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" }, { "category": "external", "summary": "1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "2031904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031904" }, { "category": "external", "summary": "2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2073157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" }, { "category": "external", "summary": "2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "2129707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129707" }, { "category": "external", "summary": "2129709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129709" }, { "category": "external", "summary": "2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "2135770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135770" }, { "category": "external", "summary": "2135771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771" }, { "category": "external", "summary": "2138971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971" }, { "category": "external", "summary": "2140597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140597" }, { "category": "external", "summary": "2141404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141404" }, { "category": "external", "summary": "2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "2148496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148496" }, { "category": "external", "summary": "2150009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009" }, { "category": "external", "summary": "2155681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155681" }, { "category": "external", "summary": "2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "2155970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155970" }, { "category": "external", "summary": "2156263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263" }, { "category": "external", "summary": "2156324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324" }, { "category": "external", "summary": "2158585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158585" }, { "category": "external", "summary": "2160585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160585" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1045.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 9", "tracking": { "current_release_date": "2024-12-18T00:38:05+00:00", "generator": { "date": "2024-12-18T00:38:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:1045", "initial_release_date": "2023-03-01T21:45:17+00:00", "revision_history": [ { "date": "2023-03-01T21:45:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-03-01T21:45:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:38:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.6 for RHEL 9", "product": { "name": "Red Hat Single Sign-On 7.6 for RHEL 9", "product_id": "9Base-RHSSO-7.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "product": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "product_id": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.6-1.redhat_00001.1.el9sso?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "product": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "product_id": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.6-1.redhat_00001.1.el9sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "product_id": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.6-1.redhat_00001.1.el9sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 9", "product_id": "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "relates_to_product_reference": "9Base-RHSSO-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 9", "product_id": "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src" }, "product_reference": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "relates_to_product_reference": "9Base-RHSSO-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 9", "product_id": "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "relates_to_product_reference": "9Base-RHSSO-7.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14040", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601614" } ], "notes": [ { "category": "description", "text": "In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6.2 and newer versions don\u0027t use the bootstrap library, hence are not affected by this flaw.\n\nRed Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.\n\nRed Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14040" }, { "category": "external", "summary": "RHBZ#1601614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601614" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14040" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute" }, { "cve": "CVE-2018-14042", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601617" } ], "notes": [ { "category": "description", "text": "In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6.2 and newer versions don\u0027t use the bootstrap library, hence are not affected by this flaw.\n\nRed Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.\n\nRed Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14042" }, { "category": "external", "summary": "RHBZ#1601617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601617" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14042", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14042" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14042", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14042" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip" }, { "cve": "CVE-2019-11358", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1701972" } ], "notes": [ { "category": "description", "text": "A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modifying objects up the prototype chain, including the global Object. A crafted JSON object passed to a vulnerable method could lead to denial of service or data injection, with various consequences.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Virtualization 4.2 EUS contains the affected version of bootstrap in the packages ovirt-js-dependencies and ovirt-engine-dashboard. These packages are deprecated in Red Hat Virtualization 4.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11358" }, { "category": "external", "summary": "RHBZ#1701972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11358", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358" }, { "category": "external", "summary": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/", "url": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/" }, { "category": "external", "summary": "https://www.drupal.org/sa-core-2019-006", "url": "https://www.drupal.org/sa-core-2019-006" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection" }, { "cve": "CVE-2020-11022", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828406" } ], "notes": [ { "category": "description", "text": "A Cross-site scripting (XSS) vulnerability exists in JQuery. This flaw allows an attacker with the ability to supply input to the \u2018HTML\u2019 function to inject Javascript into the page where that input is rendered, and have it delivered by the browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method", "title": "Vulnerability summary" }, { "category": "other", "text": "No supported release of Red Hat OpenStack Platform is affected by this vulnerability as no shipped packages contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11022" }, { "category": "external", "summary": "RHBZ#1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11022", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2" } ], "release_date": "2020-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method" }, { "cve": "CVE-2020-11023", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1850004" } ], "notes": [ { "category": "description", "text": "A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery\u0027s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux versions 6, 7, and 8 ship a vulnerable version of JQuery in the `pcs` component. However, the vulnerability has not been found to be exploitable in reasonable scenarios. \n\nIn RHEL7, pcs-0.9.169-3.el7_9.3 [RHSA-2022:7343] contains an updated version of jquery (3.6.0), which does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11023" }, { "category": "external", "summary": "RHBZ#1850004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023" }, { "category": "external", "summary": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/", "url": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" } ], "release_date": "2020-04-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods" }, { "cve": "CVE-2021-35065", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156324" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "glob-parent: Regular Expression Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The glob-parent package is a transitive dependency and this is not used directly in any of the Red Hat products. Hence, the impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-35065" }, { "category": "external", "summary": "RHBZ#2156324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-35065", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294", "url": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294" } ], "release_date": "2022-12-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glob-parent: Regular Expression Denial of Service" }, { "cve": "CVE-2021-44906", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2066009" } ], "notes": [ { "category": "description", "text": "An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker to trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "minimist: prototype pollution", "title": "Vulnerability summary" }, { "category": "other", "text": "The original fix for CVE-2020-7598 was incomplete as it was still possible to bypass in some cases. While this flaw (CVE-2021-44906) enables attackers to control objects that they should not have access to, actual exploitation would still require a chain of independent flaws. Even though the CVSS for CVE-2021-44906 is higher than CVE-2020-7598, they are both rated as having Moderate impact.\n\nWithin Red Hat Satellite 6 this flaw has been rated as having a security impact of Low. It is not currently planned to be addressed there, as the minimist library is only included in the -doc subpackage and is part of test fixtures that are not in the execution path used by the rabl gem.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44906" }, { "category": "external", "summary": "RHBZ#2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-xvch-5gv4-984h", "url": "https://github.com/advisories/GHSA-xvch-5gv4-984h" } ], "release_date": "2022-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "minimist: prototype pollution" }, { "acknowledgments": [ { "names": [ "Marcus Nilsson" ], "organization": "usd AG" } ], "cve": "CVE-2022-1274", "cwe": { "id": "CWE-80", "name": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)" }, "discovery_date": "2022-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073157" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: HTML injection in execute-actions-email Admin REST API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1274" }, { "category": "external", "summary": "RHBZ#2073157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1274", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725" } ], "release_date": "2023-02-28T18:57:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: HTML injection in execute-actions-email Admin REST API" }, { "acknowledgments": [ { "names": [ "Grzegorz Tworek" ], "organization": "SISOFT s.c." } ], "cve": "CVE-2022-1438", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031904" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. Under specific circumstances, HTML entities are not sanitized during user impersonation, resulting in a Cross-site scripting (XSS) vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: XSS on impersonation under specific circumstances", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1438" }, { "category": "external", "summary": "RHBZ#2031904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1438", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1438" } ], "release_date": "2023-02-28T18:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: XSS on impersonation under specific circumstances" }, { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2150009" } ], "notes": [ { "category": "description", "text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).", "title": "Vulnerability description" }, { "category": "summary", "text": "SnakeYaml: Constructor Deserialization Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1471" }, { "category": "external", "summary": "RHBZ#2150009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2", "url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2" } ], "release_date": "2022-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "SnakeYaml: Constructor Deserialization Remote Code Execution" }, { "cve": "CVE-2022-2764", "discovery_date": "2022-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2117506" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow with EJB invocations. This flaw allows an attacker to generate a valid HTTP request and send it to the server on an established connection after removing the LAST_CHUNK from the bytes, causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2764" }, { "category": "external", "summary": "RHBZ#2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2764" } ], "release_date": "2022-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations" }, { "acknowledgments": [ { "names": [ "Peter Flintholm" ], "organization": "Trifork" } ], "cve": "CVE-2022-3916", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2022-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141404" } ], "notes": [ { "category": "description", "text": "A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: Session takeover with OIDC offline refreshtokens", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3916" }, { "category": "external", "summary": "RHBZ#2141404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3916" } ], "release_date": "2022-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: Session takeover with OIDC offline refreshtokens" }, { "cve": "CVE-2022-4137", "cwe": { "id": "CWE-81", "name": "Improper Neutralization of Script in an Error Message Web Page" }, "discovery_date": "2022-11-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2148496" } ], "notes": [ { "category": "description", "text": "A reflected cross-site scripting (XSS) vulnerability was found in the \u0027oob\u0027 OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: reflected XSS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4137" }, { "category": "external", "summary": "RHBZ#2148496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4137", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137" } ], "release_date": "2023-03-01T13:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: reflected XSS attack" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-25857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126789" } ], "notes": [ { "category": "description", "text": "A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Denial of Service due to missing nested depth limitation for collections", "title": "Vulnerability summary" }, { "category": "other", "text": "For RHEL-8 it\u0027s downgraded to moderate because \"snakeyaml\" itself in RHEL 8 or RHEL-9 isn\u0027t shipped and \"prometheus-jmx-exporter\" is needed as build dependency. And it\u0027s not directly exploitable, hence severity marked as moderate.\nRed Hat Integration and AMQ products are not vulnerable to this flaw, so their severity has been lowered to moderate.\nRed Hat Single Sign-On uses snakeyaml from liquibase-core and is only used when performing migrations and would require administrator privileges to execute, hence severity marked as Low.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be present soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25857" }, { "category": "external", "summary": "RHBZ#2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25857", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857" }, { "category": "external", "summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525" } ], "release_date": "2022-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "snakeyaml: Denial of Service due to missing nested depth limitation for collections" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-37603", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140597" } ], "notes": [ { "category": "description", "text": "A flaw was found in loader-utils webpack library. When the url variable from interpolateName is set, the prototype can be polluted. This issue could lead to a regular expression Denial of Service (ReDoS), affecting the availability of the affected component.", "title": "Vulnerability description" }, { "category": "summary", "text": "loader-utils: Regular expression denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-37603" }, { "category": "external", "summary": "RHBZ#2140597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140597" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-37603", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-37603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37603" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "loader-utils: Regular expression denial of service" }, { "cve": "CVE-2022-38749", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129706" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38749" }, { "category": "external", "summary": "RHBZ#2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38749", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode" }, { "cve": "CVE-2022-38750", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129707" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38750" }, { "category": "external", "summary": "RHBZ#2129707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129707" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38750", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38750" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject" }, { "cve": "CVE-2022-38751", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129709" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38751" }, { "category": "external", "summary": "RHBZ#2129709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38751", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38751" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38751", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38751" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match" }, { "cve": "CVE-2022-40149", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135771" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. This flaw allows an attacker to supply content that causes the parser to crash by writing outside the memory bounds if the parser is running on user-supplied input, resulting in a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: parser crash by stackoverflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40149" }, { "category": "external", "summary": "RHBZ#2135771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149" }, { "category": "external", "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1", "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: parser crash by stackoverflow" }, { "cve": "CVE-2022-40150", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135770" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. If the parser is running on user-supplied input, an attacker may supply content that causes the parser to crash, causing memory exhaustion. This effect may support a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: memory exhaustion via user-supplied XML or JSON data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40150" }, { "category": "external", "summary": "RHBZ#2135770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40150", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40150" }, { "category": "external", "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1", "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jettison: memory exhaustion via user-supplied XML or JSON data" }, { "cve": "CVE-2022-42003", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135244" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled due to unchecked primitive value deserializers to avoid deep wrapper array nesting.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42003" }, { "category": "external", "summary": "RHBZ#2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS" }, { "cve": "CVE-2022-42004", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135247" } ], "notes": [ { "category": "description", "text": "A flaw was found In FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion due to the lack of a check in BeanDeserializer._deserializeFromArray to prevent the use of deeply nested arrays. An application is only vulnerable with certain customized choices for deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: use of deeply nested arrays", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42004" }, { "category": "external", "summary": "RHBZ#2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42004", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: use of deeply nested arrays" }, { "cve": "CVE-2022-45047", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2145194" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache MINA SSHD, when using Java deserialization to load a serialized java.security.PrivateKey. An attacker could benefit from unsafe deserialization by inserting unsecured data that may affect the application or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "mina-sshd: Java unsafe deserialization vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Impact as High as there\u0027s a mitigation for minimizing the impact which the flaw requires org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to be impacted, which would require an external/public API for an attacker to benefit from it. \n\nRed Hat Fuse 7 and Red Hat JBoss Enterprise Application Platform 7 have a lower rate (moderate) as it\u0027s very unlikely to be exploited since those are for internal usage or use a custom implementation in their case.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45047" }, { "category": "external", "summary": "RHBZ#2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45047", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047" }, { "category": "external", "summary": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html", "url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html" } ], "release_date": "2022-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" }, { "category": "workaround", "details": "From the maintainer:\n\nFor Apache MINA SSHD \u003c= 2.9.1, do not use org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to generate and later load your server\u0027s host key. Use separately generated host key files, for instance in OpenSSH format, and load them via a org.apache.sshd.common.keyprovider.FileKeyPairProvider instead. Or use a custom implementation instead of \nSimpleGeneratorHostKeyProvider that uses the OpenSSH format for storing and loading the host key (via classes OpenSSHKeyPairResourceWriter and OpenSSHKeyPairResourceParser).", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mina-sshd: Java unsafe deserialization vulnerability" }, { "cve": "CVE-2022-45693", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155970" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jettison, where it is vulnerable to a denial of service caused by a stack-based buffer overflow. By sending a specially-crafted request using the map parameter, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has determined the impact of this flaw to be Moderate; a successful attack using this flaw would require the processing of untrusted, unsanitized, or unrestricted user inputs, which runs counter to established Red Hat security practices.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45693" }, { "category": "external", "summary": "RHBZ#2155970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45693" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos" }, { "cve": "CVE-2022-46175", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156263" } ], "notes": [ { "category": "description", "text": "A flaw was found in the json5 package. The affected version of the json5 package could allow an attacker to set arbitrary and unexpected keys on the object returned from JSON5.parse.", "title": "Vulnerability description" }, { "category": "summary", "text": "json5: Prototype Pollution in JSON5 via Parse Method", "title": "Vulnerability summary" }, { "category": "other", "text": "The json5 package is a build-time dependency in Red Hat products and is not used in production runtime. Hence, the impact is set to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46175" }, { "category": "external", "summary": "RHBZ#2156263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175" }, { "category": "external", "summary": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h", "url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h" } ], "release_date": "2022-12-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "json5: Prototype Pollution in JSON5 via Parse Method" }, { "cve": "CVE-2022-46363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155681" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache CXF that could allow an attacker to perform a remote directory listing or code exfiltration. This issue only applies when the CXFServlet is configured with both the static-resources-list and redirect-query-check attributes. These attributes are not supposed to be used together, so the issue can only occur if the CXF service is misconfigured.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: directory listing / code exfiltration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46363" }, { "category": "external", "summary": "RHBZ#2155681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46363", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46363" }, { "category": "external", "summary": "https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c", "url": "https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "CXF: directory listing / code exfiltration" }, { "cve": "CVE-2022-46364", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155682" } ], "notes": [ { "category": "description", "text": "A SSRF vulnerability was found in Apache CXF. This issue occurs when parsing the href attribute of XOP:Include in MTOM requests, allowing an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSRF Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Integration Camel Quarkus does not support CXF extensions and so is affected at a reduced impact of Moderate.\nThe RHSSO server does not ship Apache CXF. The component mentioned in CVE-2022-46364 is a transitive dependency coming from Fuse adapters and the test suite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46364" }, { "category": "external", "summary": "RHBZ#2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2", "url": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "CXF: SSRF Vulnerability" }, { "acknowledgments": [ { "names": [ "Sourav Kumar" ], "organization": "https://github.com/souravs17031999", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2023-0091", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-10-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2158585" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: Client Registration endpoint does not check token revocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0091" }, { "category": "external", "summary": "RHBZ#2158585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0091", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0091" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg" }, { "category": "external", "summary": "https://github.com/keycloak/security/issues/27", "url": "https://github.com/keycloak/security/issues/27" } ], "release_date": "2022-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: Client Registration endpoint does not check token revocation" }, { "acknowledgments": [ { "names": [ "Jordi Zayuelas i Mu\u00f1oz" ], "organization": "A1 Digital", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2023-0264", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "discovery_date": "2023-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2160585" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak\u0027s OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, Integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: user impersonation via stolen uuid code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0264" }, { "category": "external", "summary": "RHBZ#2160585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0264" } ], "release_date": "2023-02-28T18:58:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.noarch", "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso.src", "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el9sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: user impersonation via stolen uuid code" } ] }
rhsa-2022_6393
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ovirt-engine packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The ovirt-engine package provides the Red Hat Virtualization Manager, a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.\n\nSecurity Fix(es):\n\n* nodejs-underscore: Arbitrary code execution via the template function (CVE-2021-23358)\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)\n\n* jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods (CVE-2020-11023)\n\n* ovirt-log-collector: RHVM admin password is logged unfiltered (CVE-2022-2806)\n\n* springframework: malicious input leads to insertion of additional log entries (CVE-2021-22096)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previously, running engine-setup did not always renew OVN certificates close to expiration or expired. With this release, OVN certificates are always renewed by engine-setup when needed. (BZ#2097558)\n\n* Previously, the Manager issued warnings of approaching certificate expiration before engine-setup could update certificates. In this release expiration warnings and certificate update periods are aligned, and certificates are updated as soon as expiration warnings occur. (BZ#2097725)\n\n* With this release, OVA export or import work on hosts with a non-standard SSH port. (BZ#2104939)\n\n* With this release, the certificate validity test is compatible with RHEL 8 and RHEL 7 based hypervisors. (BZ#2107250)\n\n* RHV 4.4 SP1 and later are only supported on RHEL 8.6, customers cannot use RHEL 8.7 or later, and must stay with RHEL 8.6 EUS. (BZ#2108985)\n\n* Previously, importing templates from the Administration Portal did not work. With this release, importing templates from the Administration Portal is possible. (BZ#2109923)\n\n* ovirt-provider-ovn certificate expiration is checked along with other RHV certificates. If ovirt-provider-ovn is about to expire or already expired, a warning or alert is raised in the audit log. To renew the ovirt-provider-ovn certificate, administators must run engine-setup. If your ovirt-provider-ovn certificate expires on a previous RHV version, upgrade to RHV 4.4 SP1 batch 2 or later, and ovirt-provider-ovn certificate will be renewed automatically in the engine-setup. (BZ#2097560)\n\n* Previously, when importing a virtual machine with manual CPU pinning, the manual pinning string was cleared, but the CPU pinning policy was not set to NONE. As a result, importing failed. In this release, the CPU pinning policy is set to NONE if the CPU pinning string is cleared, and importing succeeds. (BZ#2104115)\n\n* Previously, the Manager could start a virtual machine with a Resize and Pin NUMA policy on a host without an equal number of physical sockets to NUMA nodes. As a result, wrong pinning was assigned to the policy. With this release, the Manager does not allow the virtual machine to be scheduled on such a virtual machine, and the pinning is correct based on the algorithm. (BZ#1955388)\n\n* Rebase package(s) to version: 4.4.7.\nHighlights, important fixes, or notable enhancements: fixed BZ#2081676 (BZ#2104831)\n\n* In this release, rhv-log-collector-analyzer provides detailed output for each problematic image, including disk names, associated virtual machine, the host running the virtual machine, snapshots, and current SPM. The detailed view is now the default. The compact option can be set by using the --compact switch in the command line. (BZ#2097536)\n\n* UnboundID LDAP SDK has been rebased on upstream version 6.0.4. See https://github.com/pingidentity/ldapsdk/releases for changes since version 4.0.14 (BZ#2092478)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6393", "url": "https://access.redhat.com/errata/RHSA-2022:6393" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "1850004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850004" }, { "category": "external", "summary": "1939284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939284" }, { "category": "external", "summary": "1944286", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944286" }, { "category": "external", "summary": "1955388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955388" }, { "category": "external", "summary": "1974974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974974" }, { "category": "external", "summary": "2034584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034584" }, { "category": "external", "summary": "2080005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080005" }, { "category": "external", "summary": "2092478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092478" }, { "category": "external", "summary": "2094577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094577" }, { "category": "external", "summary": "2097536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097536" }, { "category": "external", "summary": "2097558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097558" }, { "category": "external", "summary": "2097560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097560" }, { "category": "external", "summary": "2097725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097725" }, { "category": "external", "summary": "2104115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104115" }, { "category": "external", "summary": "2104831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104831" }, { "category": "external", "summary": "2104939", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104939" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2107250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107250" }, { "category": "external", "summary": "2107267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107267" }, { "category": "external", "summary": "2108985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108985" }, { "category": "external", "summary": "2109923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109923" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6393.json" } ], "title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) [ovirt-4.5.2] bug fix and security update", "tracking": { "current_release_date": "2024-12-18T00:36:07+00:00", "generator": { "date": "2024-12-18T00:36:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6393", "initial_release_date": "2022-09-08T11:31:04+00:00", "revision_history": [ { "date": "2022-09-08T11:31:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-08T11:31:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:36:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product": { "name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhev_manager:4.4:el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "product": { "name": "unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "product_id": "unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/unboundid-ldapsdk@6.0.4-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "product": { "name": "ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "product_id": "ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.3.5-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-web-ui-0:1.9.1-1.el8ev.src", "product": { "name": "ovirt-web-ui-0:1.9.1-1.el8ev.src", "product_id": "ovirt-web-ui-0:1.9.1-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-web-ui@1.9.1-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "product": { "name": "rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "product_id": "rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhv-log-collector-analyzer@1.0.15-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "product": { "name": "ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "product_id": "ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-extension-aaa-ldap@1.4.6-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "product": { "name": "ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "product_id": "ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.5.4-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-log-collector-0:4.4.7-2.el8ev.src", "product": { "name": "ovirt-log-collector-0:4.4.7-2.el8ev.src", "product_id": "ovirt-log-collector-0:4.4.7-2.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-log-collector@4.4.7-2.el8ev?arch=src" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "product": { "name": "vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "product_id": "vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc-java@1.7.2-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "product": { "name": "ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "product_id": "ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine@4.5.2.4-0.1.el8ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "product": { "name": "unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "product_id": "unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/unboundid-ldapsdk@6.0.4-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "product": { "name": "unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "product_id": "unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/unboundid-ldapsdk-javadoc@6.0.4-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "product": { "name": "ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "product_id": "ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.3.5-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "product": { "name": "ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "product_id": "ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-web-ui@1.9.1-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "product": { "name": "rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "product_id": "rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhv-log-collector-analyzer@1.0.15-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "product": { "name": "ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "product_id": "ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-extension-aaa-ldap@1.4.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "product": { "name": "ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "product_id": "ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-extension-aaa-ldap-setup@1.4.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "product": { "name": "ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "product_id": "ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.5.4-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "product": { "name": "ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "product_id": "ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh-grafana-integration-setup@4.5.4-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "product": { "name": "ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "product_id": "ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh-setup@4.5.4-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "product": { "name": "ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "product_id": "ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-log-collector@4.4.7-2.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "product": { "name": "vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "product_id": "vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc-java@1.7.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch", "product": { "name": "vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch", "product_id": "vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc-java-javadoc@1.7.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-backend@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-tools@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.5.2.4-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "rhvm-0:4.5.2.4-0.1.el8ev.noarch", "product": { "name": "rhvm-0:4.5.2.4-0.1.el8ev.noarch", "product_id": "rhvm-0:4.5.2.4-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm@4.5.2.4-0.1.el8ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-0:4.5.2.4-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src" }, "product_reference": "ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch" }, "product_reference": "ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-0:4.5.4-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src" }, "product_reference": "ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch" }, "product_reference": "ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch" }, "product_reference": "ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch" }, "product_reference": "ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src" }, "product_reference": "ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch" }, "product_reference": "ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch" }, "product_reference": "ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src" }, "product_reference": "ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-log-collector-0:4.4.7-2.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch" }, "product_reference": "ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-log-collector-0:4.4.7-2.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src" }, "product_reference": "ovirt-log-collector-0:4.4.7-2.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-web-ui-0:1.9.1-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch" }, "product_reference": "ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-web-ui-0:1.9.1-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src" }, "product_reference": "ovirt-web-ui-0:1.9.1-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch" }, "product_reference": "rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src" }, "product_reference": "rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-0:4.5.2.4-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch" }, "product_reference": "rhvm-0:4.5.2.4-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch" }, "product_reference": "unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "unboundid-ldapsdk-0:6.0.4-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src" }, "product_reference": "unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch" }, "product_reference": "unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch" }, "product_reference": "vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src" }, "product_reference": "vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" }, "product_reference": "vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-11022", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-04-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828406" } ], "notes": [ { "category": "description", "text": "A Cross-site scripting (XSS) vulnerability exists in JQuery. This flaw allows an attacker with the ability to supply input to the \u2018HTML\u2019 function to inject Javascript into the page where that input is rendered, and have it delivered by the browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method", "title": "Vulnerability summary" }, { "category": "other", "text": "No supported release of Red Hat OpenStack Platform is affected by this vulnerability as no shipped packages contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch" ], "known_not_affected": [ "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11022" }, { "category": "external", "summary": "RHBZ#1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11022", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2" } ], "release_date": "2020-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-08T11:31:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6393" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method" }, { "cve": "CVE-2020-11023", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1850004" } ], "notes": [ { "category": "description", "text": "A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery\u0027s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux versions 6, 7, and 8 ship a vulnerable version of JQuery in the `pcs` component. However, the vulnerability has not been found to be exploitable in reasonable scenarios. \n\nIn RHEL7, pcs-0.9.169-3.el7_9.3 [RHSA-2022:7343] contains an updated version of jquery (3.6.0), which does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch" ], "known_not_affected": [ "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11023" }, { "category": "external", "summary": "RHBZ#1850004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023" }, { "category": "external", "summary": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/", "url": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" } ], "release_date": "2020-04-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-08T11:31:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6393" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods" }, { "cve": "CVE-2021-22096", "discovery_date": "2021-12-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034584" } ], "notes": [ { "category": "description", "text": "In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: malicious input leads to insertion of additional log entries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch" ], "known_not_affected": [ "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22096" }, { "category": "external", "summary": "RHBZ#2034584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22096", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22096" } ], "release_date": "2021-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-08T11:31:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6393" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "springframework: malicious input leads to insertion of additional log entries" }, { "cve": "CVE-2021-23358", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2021-03-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944286" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-underscore. Arbitrary code execution via the template function is possible, particularly when a variable property is passed as an argument as it is not sanitized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-underscore: Arbitrary code execution via the template function", "title": "Vulnerability summary" }, { "category": "other", "text": "Whilst the OpenShift Container Platform (OCP) openshift4/ose-grafana and openshift3/grafana as well as console, grc-ui and search-ui containers for Red Hat Advanced Management for Kubernetes (RHACM) include the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Additionally this library is used in openshift4/ose-grafana container only in Grafana End-to-End Test package. Therefore the impact by this flaw is reduced to Low and the affected OCP components are marked as \"will not fix\" at this time and to Moderate for the affected RHACM components. This might be fixed in a future release.\n\nRed Hat Enterprise Virtualization includes the vulnerable underscore library, however it is not parsing any untrusted data, therefore impact is reduced to Low.\n\nBelow Red Hat products include the underscore dependency, but it is not used by the product and hence this issue has been rated as having a security impact of Low.\n\n* Red Hat Quay\n* Red Hat Gluster Storage 3\n* Red Hat OpenShift Container Storage 4\n* Red Hat Ceph Storage 3 and 4", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23358" }, { "category": "external", "summary": "RHBZ#1944286", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944286" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23358", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23358" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-08T11:31:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6393" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-underscore: Arbitrary code execution via the template function" }, { "cve": "CVE-2022-2806", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-04-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2080005" } ], "notes": [ { "category": "description", "text": "A flaw was found in the ovirt-log-collector, which led to the logging of plaintext passwords in the log file. This flaw allows an attacker with sufficient privileges to read the log file, leading to a loss of confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "ovirt-log-collector: RHVM admin password is logged unfiltered", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2806" }, { "category": "external", "summary": "RHBZ#2080005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2806" } ], "release_date": "2022-05-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-08T11:31:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6393" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ovirt-log-collector: RHVM admin password is logged unfiltered" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-08T11:31:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6393" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.5.2.4-0.1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.5.4-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.5.4-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-0:1.4.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-extension-aaa-ldap-setup-0:1.4.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.3.5-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-log-collector-0:4.4.7-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.9.1-1.el8ev.src", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.15-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.5.2.4-0.1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:unboundid-ldapsdk-0:6.0.4-1.el8ev.src", "8Base-RHV-S-4.4:unboundid-ldapsdk-javadoc-0:6.0.4-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.noarch", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-0:1.7.2-1.el8ev.src", "8Base-RHV-S-4.4:vdsm-jsonrpc-java-javadoc-0:1.7.2-1.el8ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_6345
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Multicluster Engine v2.1\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Multicluster engine for Kubernetes 2.1 images\n\nMulticluster engine for Kubernetes provides the foundational components\nthat are necessary for the centralized management of multiple\nKubernetes-based clusters across data centers, public clouds, and private\nclouds.\n\nYou can use the engine to create new Red Hat OpenShift Container Platform\nclusters or to bring existing Kubernetes-based clusters under management by\nimporting them. After the clusters are managed, you can use the APIs that\nare provided by the engine to distribute configuration based on placement\npolicy.\n\nSecurity fixes:\n\n* CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS\n\n* CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header\n\n* CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions\n\n* CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip\n\n* CVE-2022-30630 golang: io/fs: stack exhaustion in Glob\n\n* CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read\n\n* CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob\n\n* CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal\n\n* CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode\n\n* CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working\n\n* CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add\n\nBug fixes:\n\n* MCE 2.1.0 Images (BZ# 2090907)\n\n* cluster-proxy-agent not able to startup (BZ# 2109394)\n\n* Create cluster button skips Infrastructure page, shows blank page (BZ# 2110713)\n\n* AWS Icon sometimes doesn\u0027t show up in create cluster wizard (BZ# 2110734)\n\n* Infrastructure descriptions in create cluster catalog should be consistent and clear (BZ# 2110811)\n\n* The user with clusterset view permission should not able to update the namespace binding with the pencil icon on clusterset details page (BZ# 2111483)\n\n* hypershift cluster creation -\u003e not all agent labels are shown in the node pools screen (BZ# 2112326)\n\n* CIM - SNO expansion, worker node status incorrect (BZ# 2114735)\n\n* Wizard fields are not pre-filled after picking credentials (BZ# 2117163)\n\n* ManagedClusterImageRegistry CR is wrong in pure MCE env", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6345", "url": "https://access.redhat.com/errata/RHSA-2022:6345" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2090907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090907" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "2109394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109394" }, { "category": "external", "summary": "2111483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111483" }, { "category": "external", "summary": "2112326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112326" }, { "category": "external", "summary": "2114735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114735" }, { "category": "external", "summary": "2117163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117163" }, { "category": "external", "summary": "2117447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117447" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6345.json" } ], "title": "Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1 security updates and bug fixes", "tracking": { "current_release_date": "2024-12-18T00:35:40+00:00", "generator": { "date": "2024-12-18T00:35:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6345", "initial_release_date": "2022-09-06T14:28:04+00:00", "revision_history": [ { "date": "2022-09-06T14:28:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-06T14:28:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:35:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "multicluster engine for Kubernetes 2.1 for RHEL 8", "product": { "name": "multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:multicluster_engine:2.1::el8" } } } ], "category": "product_family", "name": "multicluster engine for Kubernetes" }, { "branches": [ { "category": "product_version", "name": "multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "product": { "name": "multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "product_id": "multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.1.0-53" } } }, { "category": "product_version", "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "product": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "product_identification_helper": { "purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "product": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.1.0-12" } } }, { "category": "product_version", "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "product": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "product_identification_helper": { "purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "product": { "name": "multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "product_id": "multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "product": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "product": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "product": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "product": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "product": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "product": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "product": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.1.0-13" } } }, { "category": "product_version", "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "product": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "product": { "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "product_id": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel8\u0026tag=v2.1.0-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "product": { "name": "multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "product_id": "multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel8\u0026tag=v2.1.0-7" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "product": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.1.0-71" } } }, { "category": "product_version", "name": "multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "product": { "name": "multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "product_id": "multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "product_identification_helper": { "purl": "pkg:oci/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.1.0-71" } } }, { "category": "product_version", "name": "multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "product": { "name": "multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "product_id": "multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "product": { "name": "multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "product_id": "multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "product_identification_helper": { "purl": "pkg:oci/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.1.0-17" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "product": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "product_identification_helper": { "purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.1.0-17" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "product": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "product_id": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "product_identification_helper": { "purl": "pkg:oci/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-deployment-controller-rhel8\u0026tag=v2.1.0-25" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "product_id": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8\u0026tag=v2.1.0-25" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "product": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "product_identification_helper": { "purl": "pkg:oci/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "product": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.1.0-19" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "product": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "product": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "product_identification_helper": { "purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "product": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.1.0-29" } } }, { "category": "product_version", "name": "multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "product": { "name": "multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "product_id": "multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "product_identification_helper": { "purl": "pkg:oci/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "product": { "name": "multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "product_id": "multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "product_identification_helper": { "purl": "pkg:oci/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.1.0-123" } } }, { "category": "product_version", "name": "multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "product": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "product_id": "multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "product_identification_helper": { "purl": "pkg:oci/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.1.0-29" } } }, { "category": "product_version", "name": "multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "product": { "name": "multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "product_id": "multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "product": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "product": { "name": "multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "product_id": "multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.1.0-14" } } }, { "category": "product_version", "name": "multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "product": { "name": "multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "product_id": "multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.1.0-15" } } }, { "category": "product_version", "name": "multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "product": { "name": "multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "product_id": "multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.1.0-11" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "product": { "name": "multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "product_id": "multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.1.0-53" } } }, { "category": "product_version", "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "product": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "product_identification_helper": { "purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "product": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.1.0-12" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "product": { "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "product_id": "multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8\u0026tag=v2.1.0-25" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "product": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "product_id": "multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.1.0-20" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "product": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "product_id": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-reporter-rhel8\u0026tag=v2.1.0-21" } } }, { "category": "product_version", "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "product": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "product_identification_helper": { "purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "product": { "name": "multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "product_id": "multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "product": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "product": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "product": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "product": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "product": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "product": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "product": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.1.0-13" } } }, { "category": "product_version", "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "product": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "product": { "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "product_id": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel8\u0026tag=v2.1.0-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "product": { "name": "multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "product_id": "multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel8\u0026tag=v2.1.0-7" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "product": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.1.0-71" } } }, { "category": "product_version", "name": "multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "product": { "name": "multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "product_id": "multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "product_identification_helper": { "purl": "pkg:oci/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.1.0-71" } } }, { "category": "product_version", "name": "multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "product": { "name": "multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "product_id": "multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "product": { "name": "multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "product_id": "multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "product_identification_helper": { "purl": "pkg:oci/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.1.0-17" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "product": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "product_identification_helper": { "purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.1.0-17" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "product": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "product_id": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "product_identification_helper": { "purl": "pkg:oci/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-deployment-controller-rhel8\u0026tag=v2.1.0-25" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "product_id": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8\u0026tag=v2.1.0-25" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "product": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "product_identification_helper": { "purl": "pkg:oci/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "product": { "name": "multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "product_id": "multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/klusterlet-operator-bundle\u0026tag=v2.1.0-107" } } }, { "category": "product_version", "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "product": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.1.0-19" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "product": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "product": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "product_identification_helper": { "purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "product": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.1.0-29" } } }, { "category": "product_version", "name": "multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "product": { "name": "multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "product_id": "multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "product_identification_helper": { "purl": "pkg:oci/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "product": { "name": "multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "product_id": "multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "product_identification_helper": { "purl": "pkg:oci/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.1.0-123" } } }, { "category": "product_version", "name": "multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "product": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "product_id": "multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "product_identification_helper": { "purl": "pkg:oci/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.1.0-29" } } }, { "category": "product_version", "name": "multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "product": { "name": "multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "product_id": "multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "product": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "product": { "name": "multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "product_id": "multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.1.0-14" } } }, { "category": "product_version", "name": "multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "product": { "name": "multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "product_id": "multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.1.0-15" } } }, { "category": "product_version", "name": "multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "product": { "name": "multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "product_id": "multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.1.0-11" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "product": { "name": "multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "product_id": "multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.1.0-53" } } }, { "category": "product_version", "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "product": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "product": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.1.0-12" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "product": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "product_id": "multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.1.0-20" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "product": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "product_id": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-reporter-rhel8\u0026tag=v2.1.0-21" } } }, { "category": "product_version", "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "product": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "product": { "name": "multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "product_id": "multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "product": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "product": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "product": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "product": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "product": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "product": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "product": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.1.0-13" } } }, { "category": "product_version", "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "product": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "product": { "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "product_id": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel8\u0026tag=v2.1.0-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "product": { "name": "multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "product_id": "multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel8\u0026tag=v2.1.0-7" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "product": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.1.0-71" } } }, { "category": "product_version", "name": "multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "product": { "name": "multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "product_id": "multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.1.0-71" } } }, { "category": "product_version", "name": "multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "product": { "name": "multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "product_id": "multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "product": { "name": "multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "product_id": "multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "product_identification_helper": { "purl": "pkg:oci/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.1.0-17" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "product": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.1.0-17" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "product": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "product_id": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "product_identification_helper": { "purl": "pkg:oci/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-deployment-controller-rhel8\u0026tag=v2.1.0-25" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "product_id": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8\u0026tag=v2.1.0-25" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "product": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "product": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.1.0-19" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "product": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "product": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "product": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.1.0-29" } } }, { "category": "product_version", "name": "multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "product": { "name": "multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "product_id": "multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "product_identification_helper": { "purl": "pkg:oci/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "product": { "name": "multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "product_id": "multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.1.0-123" } } }, { "category": "product_version", "name": "multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "product": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "product_id": "multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "product_identification_helper": { "purl": "pkg:oci/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.1.0-29" } } }, { "category": "product_version", "name": "multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "product": { "name": "multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "product_id": "multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "product": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "product": { "name": "multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "product_id": "multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.1.0-14" } } }, { "category": "product_version", "name": "multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "product": { "name": "multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "product_id": "multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.1.0-15" } } }, { "category": "product_version", "name": "multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le", "product": { "name": "multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le", "product_id": "multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.1.0-11" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "product": { "name": "multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "product_id": "multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.1.0-53" } } }, { "category": "product_version", "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "product": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "product_identification_helper": { "purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "product": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.1.0-12" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "product": { "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "product_id": "multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8\u0026tag=v2.1.0-25" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "product": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "product_id": "multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.1.0-20" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "product": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "product_id": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-reporter-rhel8\u0026tag=v2.1.0-21" } } }, { "category": "product_version", "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "product": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "product_identification_helper": { "purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "product": { "name": "multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "product_id": "multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "product": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "product": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "product": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "product": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.1.0-8" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "product": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "product": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "product": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.1.0-13" } } }, { "category": "product_version", "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "product": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "product": { "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "product_id": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel8\u0026tag=v2.1.0-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "product": { "name": "multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "product_id": "multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-proxy-rhel8\u0026tag=v2.1.0-7" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "product": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.1.0-71" } } }, { "category": "product_version", "name": "multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "product": { "name": "multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "product_id": "multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "product_identification_helper": { "purl": "pkg:oci/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.1.0-71" } } }, { "category": "product_version", "name": "multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "product": { "name": "multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "product_id": "multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "product": { "name": "multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "product_id": "multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "product_identification_helper": { "purl": "pkg:oci/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.1.0-17" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "product": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "product_identification_helper": { "purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.1.0-17" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "product": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "product_id": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "product_identification_helper": { "purl": "pkg:oci/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-deployment-controller-rhel8\u0026tag=v2.1.0-25" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "product_id": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8\u0026tag=v2.1.0-25" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "product": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "product_identification_helper": { "purl": "pkg:oci/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "product": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.1.0-19" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "product": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "product": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "product_identification_helper": { "purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "product": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.1.0-29" } } }, { "category": "product_version", "name": "multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "product": { "name": "multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "product_id": "multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "product_identification_helper": { "purl": "pkg:oci/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.1.0-9" } } }, { "category": "product_version", "name": "multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "product": { "name": "multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "product_id": "multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "product_identification_helper": { "purl": "pkg:oci/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.1.0-123" } } }, { "category": "product_version", "name": "multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "product": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "product_id": "multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "product_identification_helper": { "purl": "pkg:oci/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.1.0-29" } } }, { "category": "product_version", "name": "multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "product": { "name": "multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "product_id": "multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.1.0-11" } } }, { "category": "product_version", "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "product": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.1.0-10" } } }, { "category": "product_version", "name": "multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "product": { "name": "multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "product_id": "multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.1.0-14" } } }, { "category": "product_version", "name": "multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "product": { "name": "multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "product_id": "multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "product_identification_helper": { "purl": "pkg:oci/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.1.0-15" } } }, { "category": "product_version", "name": "multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "product": { "name": "multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "product_id": "multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.1.0-11" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le" }, "product_reference": "multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64" }, "product_reference": "multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x" }, "product_reference": "multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64" }, "product_reference": "multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x" }, "product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64" }, "product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le" }, "product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64" }, "product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64" }, "product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x" }, "product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le" }, "product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64" }, "product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64" }, "product_reference": "multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64" }, "product_reference": "multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le" }, "product_reference": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64" }, "product_reference": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64" }, "product_reference": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le" }, "product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64" }, "product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64" }, "product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64" }, "product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x" }, "product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64" }, "product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le" }, "product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le" }, "product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64" }, "product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64" }, "product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x" }, "product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x" }, "product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64" }, "product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le" }, "product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64" }, "product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64" }, "product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64" }, "product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le" }, "product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x" }, "product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64" }, "product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x" }, "product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le" }, "product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64" }, "product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64" }, "product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64" }, "product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x" }, "product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le" }, "product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le" }, "product_reference": "multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64" }, "product_reference": "multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x" }, "product_reference": "multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64" }, "product_reference": "multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64" }, "product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x" }, "product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64" }, "product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le" }, "product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64" }, "product_reference": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64" }, "product_reference": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le" }, "product_reference": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x" }, "product_reference": "multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64" }, "product_reference": "multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64" }, "product_reference": "multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x" }, "product_reference": "multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le" }, "product_reference": "multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x" }, "product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le" }, "product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64" }, "product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64" }, "product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64" }, "product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le" }, "product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x" }, "product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64" }, "product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64" }, "product_reference": "multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64" }, "product_reference": "multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le" }, "product_reference": "multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x" }, "product_reference": "multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64" }, "product_reference": "multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le" }, "product_reference": "multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x" }, "product_reference": "multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64" }, "product_reference": "multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le" }, "product_reference": "multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64" }, "product_reference": "multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x" }, "product_reference": "multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64" }, "product_reference": "multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le" }, "product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64" }, "product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64" }, "product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x" }, "product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le" }, "product_reference": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x" }, "product_reference": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64" }, "product_reference": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64" }, "product_reference": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64" }, "product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64" }, "product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le" }, "product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x" }, "product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64" }, "product_reference": "multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64" }, "product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x" }, "product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64" }, "product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le" }, "product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le" }, "product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64" }, "product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x" }, "product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64" }, "product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le" }, "product_reference": "multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64" }, "product_reference": "multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x" }, "product_reference": "multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64" }, "product_reference": "multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64" }, "product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le" }, "product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x" }, "product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64" }, "product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x" }, "product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64" }, "product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le" }, "product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64" }, "product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64" }, "product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64" }, "product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le" }, "product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x" }, "product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64" }, "product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x" }, "product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64" }, "product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le" }, "product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64" }, "product_reference": "multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64" }, "product_reference": "multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x" }, "product_reference": "multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le" }, "product_reference": "multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64" }, "product_reference": "multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le" }, "product_reference": "multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64" }, "product_reference": "multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x" }, "product_reference": "multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64" }, "product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x" }, "product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le" }, "product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64" }, "product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64" }, "product_reference": "multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x" }, "product_reference": "multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le" }, "product_reference": "multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64" }, "product_reference": "multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64" }, "product_reference": "multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x" }, "product_reference": "multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le" }, "product_reference": "multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64" }, "product_reference": "multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64" }, "product_reference": "multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64 as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64" }, "product_reference": "multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x" }, "product_reference": "multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le as a component of multicluster engine for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" }, "product_reference": "multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-1962", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107376" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: stack exhaustion in all Parse* functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1962" }, { "category": "external", "summary": "RHBZ#2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962" }, { "category": "external", "summary": "https://go.dev/issue/53616", "url": "https://go.dev/issue/53616" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: go/parser: stack exhaustion in all Parse* functions" }, { "cve": "CVE-2022-28131", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107390" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Decoder.Skip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28131" }, { "category": "external", "summary": "RHBZ#2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131" }, { "category": "external", "summary": "https://go.dev/issue/53614", "url": "https://go.dev/issue/53614" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Decoder.Skip" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-30630", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107371" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: io/fs: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30630" }, { "category": "external", "summary": "RHBZ#2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630" }, { "category": "external", "summary": "https://go.dev/issue/53415", "url": "https://go.dev/issue/53415" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: io/fs: stack exhaustion in Glob" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" }, { "cve": "CVE-2022-30632", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107386" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: path/filepath: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30632" }, { "category": "external", "summary": "RHBZ#2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632" }, { "category": "external", "summary": "https://go.dev/issue/53416", "url": "https://go.dev/issue/53416" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: path/filepath: stack exhaustion in Glob" }, { "cve": "CVE-2022-30633", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107392" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Unmarshal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30633" }, { "category": "external", "summary": "RHBZ#2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633" }, { "category": "external", "summary": "https://go.dev/issue/53611", "url": "https://go.dev/issue/53611" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Unmarshal" }, { "cve": "CVE-2022-30635", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107388" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/gob: stack exhaustion in Decoder.Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30635" }, { "category": "external", "summary": "RHBZ#2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635" }, { "category": "external", "summary": "https://go.dev/issue/53615", "url": "https://go.dev/issue/53615" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/gob: stack exhaustion in Decoder.Decode" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107383" } ], "notes": [ { "category": "description", "text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32148" }, { "category": "external", "summary": "RHBZ#2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148" }, { "category": "external", "summary": "https://go.dev/issue/53423", "url": "https://go.dev/issue/53423" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T14:28:04+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/install_upgrade/installing-while-connected-online-mce", "product_ids": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:661ee3a57d860a713ffb481ea87858f20fce1e57b858821cb0c1ec4069e206a0_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:8cb5ab317ccc6b1bcd409cfba0ec983e3f5d9531227e76bb455011636ed32d21_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:e136966121b82373c9279b1b59b68864ed10bfdee424959a7ad4b190ff7a2562_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/agent-service-rhel8@sha256:fce50212c8bbfdc3e8f445f4b7ea35881eb29e49c443e827ad6fe2389328d57f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:25b242af63aca69a32c457dde23b3ac52ed81f5edad3e919d5df59902adb0b60_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:5ea69e650771525faf944fbf3be82a19e54a964d38adbb88263247652476938c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:c97ea925ea31a1ae6824ec55bbb43c3cf0d2d9b0fb6d12b6d23492e0e5a5467a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/apiserver-network-proxy-rhel8@sha256:f71c4c301774aba9a886f2891eace9da47ba075d2a2e4acfc03849c9c0da57bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:1d250617cf4eb47800d30bd6bdd61872faa29eb7c6953edcb4a107360f0d0a78_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3730a3c3cfb695b540945b5f0ae739a701a0155137b9509238860549105ab670_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:3d59cfa190838da34bac1ccf88562f996cc9e9ffdb151f47e044ba3fcc964a3d_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-image-service-rhel8@sha256:92c8157e43d84584ba93d978fcc6ffba84118e4ea5ff46ad71a62ffdc7fc56e5_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:99e0accdee9b311b9abf032c712060823736f88c7bf3ba692349d7f8290a9570_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-agent-rhel8@sha256:b4722c060fb38e1609e689b605816cefb39a15a0ddc40837a90727d123b91c88_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:1d465abc36e2045dc5a291663786709fc920c42aacb0c34c4868a1a633334509_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:bdb861698be8305247b21ebab7994f27eaae818f691ffcff3d5b5eb5dc70a722_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-reporter-rhel8@sha256:e4dd90d186f1fea6fcdb4e23f74e4390e00d134b2c21d8510c1cdbbcef3c4a1f_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:61ac4136dad0e02323807e6d3de8e890ec0b7e7e1f7112f9610410712af6f9b5_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:686b64358857be04087a706048a32b7356b16a0028d2b200da16ec94d931d25d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/assisted-installer-rhel8@sha256:910dad58b72de16f92dd5b60d0420010d18229a6e0966fe2eb072517febe499f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:31329737bd3608345f8e969e872e2e18305e2959d9d81867933c73fb26a53dcd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:9797eef2012c827ff3250cba1cd542772e92872b4bd69a01bdbdba4fe407472c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:ab7f1982f21ed9251501396ea150764348b5f61b6e50b9d74b5031e705e16ef3_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/aws-encryption-provider-rhel8@sha256:cee69ba4c6fb326afd03c7f21856a028fa4758dab8c849ef6eaeaea0cd55afd2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:0b8c36b4b1d00e47ee4faaeec9ccbdc2977a50592035f8a600491c657e439d33_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:5dbd590a4bbed44f487d1601d1825b5efb8253b9ee2be49adccec7e0ea9410ac_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:9f7854a1de26dfebdc8beafffd01304017b8fe7cd84065dd452de1276e529a06_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/backplane-rhel8-operator@sha256:e7998dc233af266ed94ba16450c2f02096abb5e045f291f8f94a83ef9da7dd51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:36a5f30d043f1137033842188e59224b803158696f60ddb41095a766705485f4_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6fb7799fca309c727c7afea57448fc653dde09495945e314402a3e3a079e5b03_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:9b8d4fde02e4c43d194bf4c420550730fd52b74587e2327f2e9eb75067bb25e7_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:bd612736fde388811d12a572852c86d0fe9dcbb6e7f404c64b8654c870d4e2eb_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2b93b026497655f16a85a2929b1f0c970d51dce0e0e8462774989f1943bdc785_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:2c9c916d0face10abc7f6467564e394ead5946bf18ed8439456cce2767a83b3e_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f41c353228c4016ab02557a5591ef36f4aea799c4ad89798343b4a2f0765d08_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:ddd59c296543f525f719336ad6ddc5e5f8d3915e08e3b64d575a9835de3e95ad_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:0007824d89632253727ead00c5fd6ec463f310d71e58e237ea5e51c13052b0bc_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:9cd9106f72557b8ba5de9f4d1de5ff8d33514d2c02889999a3c20aab9a8dd061_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:cbe319cfa3ab4610dc67abea27841dd5b670061faa74e666959550343bba1c28_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:df94a1d8a4b6d1aebed4e657267219632bb3b2176537bdf8e51a728cd78f136f_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:30f56a4d5cba0ccd55e0bda756c7af8010ab94ec3b644dc73f7b32e76b5bbb3a_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:4f7cb34768ff908ed1ba54330603ea54b82a4144cf9124dae01a727dcc60362a_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:a137205ac2127a04466519355b07cee71c08c56dddfee35671127241ebdf4a99_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-api-rhel8@sha256:c8a785b4e1688d358cec73e9cf4853ca0ab28c7daa4c45d5384b7bebc333f53a_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:1d4d913d4136321ebd94e6b9d9e55be7262883702de72c4a61827804ad843942_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2134c387cb0e8c2f95bb8ef74ad0a10c37403d9e0dfaeb7e2e9efb388c606ac1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:2e0867d6ebace932eb09bb3a6a929562a157bc2eea9c28063eb30dac866abf63_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-curator-controller-rhel8@sha256:3dd533817d97518c7af991b888c5f9df501bd496ed53988e5444c1ea62e539cb_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:2779eae299eb2b48e8a868de2f2d8d13313ca17b2f7d5c816013145b0c787cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:28544cf2414bdeffb8bcaae2d1547064da46ab5a122fd77861083b1e81e299cc_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:4da01f6a0a59069045d23599d748849da60ee309f72f233497edd379b3b0823e_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-addon-rhel8@sha256:6318fd6b0e0f5c39239ba9c71c330bce7974deaf970359ec83c88116abf7a653_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:610de7f25fd387262c360acb21dd45dc80e1c52a77dd11982965da80301407ab_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:a881a94835c7eef6babe00792fc0a99c9816831869cb26af0dcf2665233f7710_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:b240f43890529fe95b1a74de6f4c2626e85ae91ae6a624bb98a4c31130b6740d_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/cluster-proxy-rhel8@sha256:df6cd66cdb17efc356e770930ff796bdb527c292243f5e8b87ca5c9e912a19d6_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:3608571c2a5a3d399e3ad8135ca90e46a7e57b322b5ef9d708efa631cee7109c_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:5c04626558442d50ab58a941d72a78db7c94f5ce730b5abb7599c21981875970_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:7be740cc5987a1dfc76d7d8a306ff65291eb9cf61419842f463aa9dc4d6ecde1_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterclaims-controller-rhel8@sha256:fce2e92743adaf6fe2e0168cfeecdc71ff7c009ef92a89c9172ff46ebbedcd40_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:288a0e4f9ca79859c5f295e920e9ef01d395720ea5b62ec7f5a5bd975b9c5850_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:93b9ad845fab34498a6f504ad626d0d5236c39ab1aaf7789df146311e4ba33cd_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:c808d378bd0666d7eb1f9c9024f7d2f7c6bdedd40298aa1e940cfc1ce735af54_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:df17928fd459e5063fb2470dbaea51c96f292f1a4ca5eaedc64a03687edbb6cd_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:12b3c0a01c59836687a7cfc1fba050d0800625cd46f678551a5944b0664c044d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:25eefa4b7af3650f57e9a4c372522a0cae7bcc1b41735d2b503b9b41d9c2d0b2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:9a655c52c83f7682964e8f46fed6011c6e9de7a2a64ee0893d0c02cf725746e1_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/discovery-rhel8@sha256:a0bcad7b2191e3c674813c2e1e67aea619d6d7eaa95f2324902e0b842d1c0cc8_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:674603ee10ad5e9d42e18e5c2f91153c863cb7e9f38cd523559c8de7c7097483_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:67b2477a7b3885df470dc56e94525e7ebc3dce326599c6f2a311f8727557bf8b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:8722d4f39942af4a008209ae518bf27d30deaa2e5bf97fc3118bea58efafb3d5_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hive-rhel8@sha256:dd6a4624672d458a0072b9aa46fb1b3d576c0b198759d053f61536f3b9e34359_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:2d94cd451fbf0abc13e50b6b6252061294bdbfd1eda64f4347177d20b5d1e489_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:3d8d114403d85cbba699f53aa177a84da92516b5d2e852b2bffc33eabde6af13_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:62e91ac9b6291bf7abc26cdd937c2c2cf7cdf1f1256a33acbaa5d1cdc607d3fa_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/hypershift-rhel8-operator@sha256:ffce5bc9fb2be59047c4840d9222499f03c1cf74786d8695aab1d1b04adc6f8a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/klusterlet-operator-bundle@sha256:1687315db647e6689845df88843ae53275440042b76dc781dcabeef16e426bdf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:17987e46eb8772ef79e771b6edd137b29914ae357eb036d76a063cb04de116a3_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:4a22ca54331be02c08e23704852c34273a8bf3d1bb2c8f2aaf92f277474e3654_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:7d737e05b3164a7e49085a2026bf5fbbdda5a0d23890e1de455eea8d59f20187_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/managedcluster-import-controller-rhel8@sha256:eaf8ba4c775e4ebaeea316bbab0344eb10674089ff9db1c8f1373ed564b03749_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:701ad2aa334971346282a7a80c420049f08a3e3845a915a947e7605aab9c1369_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:cf1b297a2bbfa2a55204e2c4688511baa0223978b2d4ab7cfb8f8c5c965d563f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:ed114b2afb91375b6f3576da15474ad96c154cc0ed16e288f8a4840d7d39942f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/mce-operator-bundle@sha256:f1be217449145edb01b029b19d08831cc6d085856e39aea8174e74ef0cc85283_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:162fe79ef40dbdcd1c9a16c601ffeb1c1dec5309c250bddf85809a0197b2ec3e_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:af5076a59d32f3bed7f88348bccdff6fad4d250aab7f8dc7c2791e75fa76c7d9_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c03edb31a56b4678c4e0f66c59b49e3798b8442ef1ddca3f67488f4baca30241_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicloud-manager-rhel8@sha256:c6fb6ec34c746ba73007bec6e1895b4e1a4ed551b035aa9059664ded820f46fa_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:208389221423692530b334815985b0a2263febf5574138e854dbdc011f03b4a2_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:4bacc4ba3974c11ac27d1448a7f7cd973162caf33358249e9d1c154018124830_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8b3c3fb8fdf6d679f6020e0c739f25ae83dd4173e46b743de911d8e346f371fe_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:a4d3f04386e63bfb640b928c01f972ba7d90af9c5213a7c10968b55c875565e0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:009597e78bf32e0a6d83ad456a6670e436692aa1c12cbd144580a30080054d0f_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:95cbc26ed2e396e44efd543d8a38f1c698267e1a617a7ee4b6f26efdb49e3059_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:b83a44a87eddeaa3914d03f51f58e8cc5412ee580ee233754108b2349d890b8c_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:e3883d9629078bc16f2a6526cb8b1fdea89c1a8b8f477487fd6b34efa2f13999_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:00322fc5e7a8e1d08ca716e23982dae6d365b1523f8d3465e6daad5074067ea2_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:27cc406bb658c1915e75f5d0b0d3c0f73e72635c9f5bb08bc28e3c5c434e147b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:afc67731faaa2dc9d32a052064763737c8bc4b1b5cf8e8ffb7cb31a4652c656c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c4227a3a5b323d716a979e1c6a66c458d458648c5fcb0ab151ad55ba24972f51_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:68de13099864a989493367500360560a677fde2e0e56a760a6dafde1d7be9a27_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:8d4a908562cbb0351aea12befe5f2bdf57041e073ce679d1b1c5b46c893844b6_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:be5d7a8b6dec6d4c959badc2d2960ec7bfe74a75c0d673da06fe6335920de3a0_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:f44b9cd7b993051b4d59108153763a09d283c0cf822fab478f22cfbe53847da7_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:63593ef6045808b9c3fe96fc1cddd99bdfabaaef881fe716972500bfda62f92b_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:7f5f65ba65c9bfc64d8bf9724a22b68d38c512465f4be1bfed8f02133256214f_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:8621056c6982b9875749650eee2cf967b31217298a1b924de1fe710e0445df1b_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:ec5bdf8a935ee1daaa5c91a7fd7816ade97619b5d1f6b61e663c03f43bb832bc_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4270ef4ed53f54fb13cf1092b3babb70af7012886a3f0c293b11040083f39651_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:4ecb20c797f71375bc888ed84036f49bc40e2e9984e7ec74b14ad697d1b9c6fb_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:6d2624faf8cb2634a9e2203273d95c076ed2207ddd87f50df6ce8e5088a5d257_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/must-gather-rhel8@sha256:e838cb2e70eff2157b992c1cc6c576c9e099306b1df69d6d5c9d991ded4e0789_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:473ed2081010b9005ecc6fb254389dac6927f336967bd4a2f99ca3210fd265f0_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:746794cb82199cfc0c659de0a48018bbd8f18aec97265d68f8dd8bbf783049b1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:7f5c7671a97f09756a150feb6a6bd04f40aa938ce065102b5b5875eadab933db_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/placement-rhel8@sha256:a6fb7f9d80d4d6cb53317f7d87960af28a6cafb8c5abee369f7bd94cbe449686_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:759037d7817cef4e0451befe8f2bc943a89f2bda95a52327a1c552c3f9a095bb_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:90281a3feff8e019a937fabb5184881c1983cda657c41332cd0321acf5ea4092_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:b6406fbcfeed4c491c66b778a4ad08e8066db5052a49863dd459e2b7375e6ba4_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/provider-credential-controller-rhel8@sha256:c4707c5214505bf1e5f693f0c5df4bb6fe4336670bf850b9a09040b6d87cccd2_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:49d81d8a383de609d64760a4ae6ffa61469a59a5678311406ce4f838c1cc66fd_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:579420cfdc2a542ab7a1b9cd6f1324885f60d1ec5d2bda74808127b45aef2983_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:f945ae948589e2ea294d3d6e8f89fe05c1203f375a0722465965208ecfc15b94_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-operator-rhel8@sha256:fbc7cd19b869d02af6dba24b20f6a44c498fb00e4afc629821f47b9b35c5a94d_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:39cc95f16445c3a1dca378beb50f5931ad081f459c9c6eb012325c6a9d8ada6c_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:686390715f19747bff24e95137307182ab095fb133051424996c6b0ee668569a_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:7bbc4dceeffd5f4bb47e9c38f97109d083dbbbda1a1643b7eb7762ebbd5047a1_ppc64le", "8Base-multicluster-engine-2.1:multicluster-engine/registration-rhel8@sha256:cb1c8096bd5bd9f1dfa413bc0d1889d970b6d841988d24d6c1008904b1288cfe_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:345f405c6a1d3e18beaf13c24a7ca4055a03746d8e6540670435e8d2413fefaf_amd64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:663cf3e0453e2ae5b1c9d5f6d335930d6d1e9c7a34151a171dbf58f9066c2b96_arm64", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:c5c1939a142b9554a2ce664605409cefcb9954bbb1d8eef988fddab50f06cdaf_s390x", "8Base-multicluster-engine-2.1:multicluster-engine/work-rhel8@sha256:d425b68e6265d098601e240cae6084c76416fd27bfbd955a3ccee30873544e38_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working" } ] }
rhsa-2022_6696
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General\nAvailability release images, which fix bugs and update container images.\n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.6 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several security issues and several bugs. See the following\nRelease Notes documentation, which will be updated shortly for this\nrelease, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/\n\nSecurity fixes:\n\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\n* moment: inefficient parsing algorithim resulting in DoS (CVE-2022-31129)\n\n* nodejs16: CRLF injection in node-undici (CVE-2022-31150)\n\n* nodejs/undici: Cookie headers uncleared on cross-origin redirect (CVE-2022-31151)\n\n* vm2: Sandbox Escape in vm2 (CVE-2022-36067)\n\nBug fixes:\n\n* RHACM 2.4 using deprecated APIs in managed clusters (BZ# 2041540)\n\n* vSphere network name doesn\u0027t allow entering spaces and doesn\u0027t reflect YAML changes (BZ# 2074766)\n\n* cluster update status is stuck, also update is not even visible (BZ# 2079418)\n\n* Policy that creates cluster role is showing as not compliant due to Request entity too large message (BZ# 2088486)\n\n* Upgraded from RHACM 2.2--\u003e2.3--\u003e2.4 and cannot create cluster (BZ# 2089490)\n\n* ACM Console Becomes Unusable After a Time (BZ# 2097464)\n\n* RHACM 2.4.6 images (BZ# 2100613)\n\n* Cluster Pools with conflicting name of existing clusters in same namespace fails creation and deletes existing cluster (BZ# 2102436)\n\n* ManagedClusters in Pending import state after ACM hub migration (BZ# 2102495)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6696", "url": "https://access.redhat.com/errata/RHSA-2022:6696" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "2041540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041540" }, { "category": "external", "summary": "2074766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074766" }, { "category": "external", "summary": "2079418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079418" }, { "category": "external", "summary": "2088486", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088486" }, { "category": "external", "summary": "2089490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089490" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2097464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097464" }, { "category": "external", "summary": "2100613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100613" }, { "category": "external", "summary": "2102436", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102436" }, { "category": "external", "summary": "2102495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102495" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2109354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109354" }, { "category": "external", "summary": "2121396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121396" }, { "category": "external", "summary": "2124794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124794" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6696.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes", "tracking": { "current_release_date": "2024-12-18T00:36:46+00:00", "generator": { "date": "2024-12-18T00:36:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6696", "initial_release_date": "2022-09-26T14:49:03+00:00", "revision_history": [ { "date": "2022-09-26T14:49:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-26T14:49:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:36:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.6-40" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "product": { "name": "rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "product_id": "rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.6-13" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "product": { "name": "rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "product_id": "rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.6-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "product_id": "rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.6-15" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "product_id": "rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.6-6" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.6-12" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "product_id": "rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.6-15" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.6-11" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.6-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "product_id": "rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "product": { "name": "rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "product_id": "rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.6-6" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "product": { "name": "rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "product_id": "rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "product_id": "rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "product": { "name": "rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "product_id": "rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "product": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "product_id": "rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-agent-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "product_id": "rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.6-14" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "product_id": "rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "product": { "name": "rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "product_id": "rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.6-13" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "product": { "name": "rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "product_id": "rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "product": { "name": "rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "product_id": "rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.6-8" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.6-40" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "product": { "name": "rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "product_id": "rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.6-13" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "product": { "name": "rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "product_id": "rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.6-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "product_id": "rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.6-15" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "product_id": "rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.6-6" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.6-12" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "product_id": "rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.6-15" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.6-11" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.6-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "product_id": "rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "product": { "name": "rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "product_id": "rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.6-6" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "product": { "name": "rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "product_id": "rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "product_id": "rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "product": { "name": "rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "product_id": "rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.6-14" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "product_id": "rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "product": { "name": "rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "product_id": "rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.6-13" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "product": { "name": "rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "product_id": "rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "product": { "name": "rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "product_id": "rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.6-8" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.6-40" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "product": { "name": "rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "product_id": "rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.6-13" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "product": { "name": "rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "product_id": "rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.6-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.6-15" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "product_id": "rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.6-6" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.6-12" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "product_id": "rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.6-15" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.6-11" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.6-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "product_id": "rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "product": { "name": "rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "product_id": "rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.6-6" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "product": { "name": "rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "product_id": "rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "product_id": "rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "product": { "name": "rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "product_id": "rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "product_id": "rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.6-14" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.6-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "product": { "name": "rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "product_id": "rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.6-13" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.6-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.6-7" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "product": { "name": "rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "product_id": "rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.6-8" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le", "product": { "name": "rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le", "product_id": "rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.6-8" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64" }, "product_reference": "rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le" }, "product_reference": "rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x" }, "product_reference": "rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64" }, "product_reference": "rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x" }, "product_reference": "rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64" }, "product_reference": "rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le" }, "product_reference": "rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le" }, "product_reference": "rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x" }, "product_reference": "rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64" }, "product_reference": "rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le" }, "product_reference": "rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x" }, "product_reference": "rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64" }, "product_reference": "rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x" }, "product_reference": "rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64" }, "product_reference": "rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" }, "product_reference": "rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-26T14:49:03+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-26T14:49:03+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-31150", "cwe": { "id": "CWE-93", "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" }, "discovery_date": "2022-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2109354" } ], "notes": [ { "category": "description", "text": "A flaw was found in the undici package. When requesting an input on an unsanitized request path, method, or headers it is possible to inject Carriage Return/Line Feed (CRLF) sequences into these requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs16: CRLF injection in node-undici", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31150" }, { "category": "external", "summary": "RHBZ#2109354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31150", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31150" } ], "release_date": "2022-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-26T14:49:03+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs16: CRLF injection in node-undici" }, { "cve": "CVE-2022-31151", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121396" } ], "notes": [ { "category": "description", "text": "A flaw was found in the undici package. After cookie headers are set, they are not cleared. This issue could allow an attacker to take advantage of this cookie, which could be used to control the redirection target.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs/undici: Cookie headers uncleared on cross-origin redirect", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31151" }, { "category": "external", "summary": "RHBZ#2121396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121396" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31151", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31151" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31151", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31151" }, { "category": "external", "summary": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31151", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31151" }, { "category": "external", "summary": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp", "url": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp" } ], "release_date": "2022-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-26T14:49:03+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6696" }, { "category": "workaround", "details": "By default, this vulnerability is not exploitable. In order to make sure this is mitigated, do not enable redirections, i.e.: `maxRedirections: 0`", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs/undici: Cookie headers uncleared on cross-origin redirect" }, { "cve": "CVE-2022-36067", "cwe": { "id": "CWE-913", "name": "Improper Control of Dynamically-Managed Code Resources" }, "discovery_date": "2022-09-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124794" } ], "notes": [ { "category": "description", "text": "A flaw was found in the vm2 sandbox when running untrusted code, as the sandbox setup does not manage proper exception handling. This flaw allows an attacker to bypass the sandbox protections and gain remote code execution on the hypervisor host or the host which is running the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "vm2: Sandbox Escape in vm2", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36067" }, { "category": "external", "summary": "RHBZ#2124794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36067", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36067" }, { "category": "external", "summary": "https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq", "url": "https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq" } ], "release_date": "2022-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-26T14:49:03+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6696" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:17c53124f6c09cc839f533aee0c870078f547fef29a19803814f5c5fbc5e7939_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:644a295644e91a8976d4df02e5ccdd711d8d3c8fa409cae698671b49b96ec00a_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:9c9b992bf748282d7cdc941b7907bbcbabe69a8b287bc4195a6bc8b9d9b6cbd0_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0cca0dbb0b7adff8eaea1315b422edb6ea1778befa4772f3e6f5755fb5519196_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:63b5758cfcffe96326b090ae51d38c00ca13b35e9fe5e4354cd33e67d042c41b_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:cfc97f6c9495bac2635e016dd47049683f8ed78c932ef2c70cec2ec7be323fea_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:346215260baa3371853d15ccc451c3ac418813c5cd9b422b0ad9f2dd6ae8a511_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cb4fca4155dc3e274712c0c7609eb6111a6e03207ddaa0d5c3c8752badc15b2c_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:cceb82a8492d7e971e515f1a0a5391a1051e4f130f7a14e412def20616e05d40_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5b5046b04aa10807a6676916cf4744f0cd36c056dd3fd626304814af2d665cf9_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:5c89bb44eda9a0754ea1d1ca69ea260f02f060c517194251519439e4b943e46a_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cfe9dfc60224b6206d6fbbc4c4ee95e378ce2da8b79c176e5e7bfdd8b0375f88_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:6acf7df47405a4ccb3ede12db6574a0829d28f94ea5d20d6041db1bd045a90c6_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:96c10e483a1c99f0ac91fb84df87ebe927e82ca35ef7e36e0f583121dcdd8b15_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:ffb0b475eccc16a227f13a3d0d332f9cd9b96eade52646352a7497f903edf1a2_s390x", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2c2f96ebf908cf415613aec65a414884ec35784e4bdcd4c4b4978aa98149af4d_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:c89023b0b424e2b8800399fc4b6cfa9336248f3222097c094d33fd2b872398aa_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:e49c328eb815293dd606199a0b8a2bd0db6bbf5d87eeaa7902d6d4df1bb41d35_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:86fd675a09451d3ee552452999cd2c82410174f5e55dcfd4f21286559363217e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:dcc214165e5c895925f52673577fa73274b017e3e9017818bf5c0327b3600ffb_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:f7004db056478b4c1b101ab0ceac24f78dbefc018a1e76e12e8a4f69fd171175_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:6e002bec6af8e7d7b0c89bc25f4a9e3224e47f5638be7cc2a9c68a5e92447254_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:815976efa30282899af7de91b5df1fdeca10c709d0fc60d09d8f3abb1c2acdc3_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0e30470d12e11f473750e0b95833d0d1fe6fd3ee9d9d0c5d7454614449156148_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2324eeab4219c1c953b698cbd1cf57e0af777f31042de00eaaa2bf163f84cae1_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:c3d60eaf9f775e623114d093450b5d170b4048ef1e52267a2153ec54489bd00f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:9969b8f2f91bd0a3ef0e89300d66a656238a3a3361d56cf7fc0eb55db1752782_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:d5639931ddcb1288f279f54a3688fcb8c94d710a457917c46bfa3db6cd1a317b_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:fa4667d27a8778efc83ace86657c638aacb7ccc3168c489d427c1d6ab834cbb2_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:4b32ee29c898c9f52a5fdeed3a6a595ac157db7051b36086eddf7a8f91b2ec08_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:9e6a260d8130731601612a56cea728fc6b80cfa3d7fd8b6612175ff76b290dea_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:faa454bab3f9ea36a2d5a1eaa16806ac3669472856833e750571e45da7074d40_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:03d738d93d893b9fd9d2587e14b9a7a92bbb5eca4b85901b5e07cff1e7a3ab73_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:22c9595f3f4d95b6dc6c17ce5412f4131d9ce501f2660f23d176f276c4a97a73_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:ae6de1e14b7897a944733cdb9963f31990d696a66260974d3f692e0af87161d3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2c7f03c0ca17163c949249bb4b480a0fd2c986e55b0dc23c6cd3b0a974b4c229_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:bd8fa875e2c6b6c650c21089441b417ae657b8e1fda2786d2f328978776a6883_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c49c92c632968e08f74d08eaa99862f0dd8dd1fe4a85f05e57efa90e5dca5563_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:3711cb41642a7fffc69a0c98db128d39d980555127f22a9d1dfd76c9631b8edc_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:60a54bc76a84f2369b02dc1b9b0d8353da93acc9f8193a26739110c6fe59abdd_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:6df08e52cee6890187b6be3a62b36c18fcff7e34630da933e0a5f7bcecec6b4c_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:8fb0581852dc1dfd80a81ba03c6976da1aa8d93675f626765f2266adfa94d5ac_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:929233f873cbf980fb850a9812c98bd09f907e26d9afeb1c0198d52776e33b32_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:a3653dcecb777d7b3915c49b7999793b90dd4524628d5517368a0837af46aa07_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:02481bcf2ddd1771d965e947cfcbad66540e2df055a3013bee5185ab84960d6d_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:3a47d211370efc6e1661d4d0abd0d5abc65d8a759218af7c2722db820a664d8c_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:789e1950e886e54c341699cc8ec0c4bfb9a0e295e49961366759e861d32d5ef9_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:5215e1a2f456b83ba4ae02ea653bef51d331ced6e9a4c67958e8c41cd88aa818_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:d5cbabd5d26e6e712d9f531db8ebaa3a793599538ef2e62262b02c165ea74b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:e797bce5724653b3ae0395c66c4796dc0594002cdde7242f4fd29c2fd5e703fa_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:224af94e4e027bfb7edff3f889ec08aa031eaede2e4a02c67ce2925f29230ea8_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:5dd54d496d15c262072c6024385e9fbf016edabe8a6bcdf31ec63ed5c445088c_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:f64cae3c176e4b18af716ba054dcebafa07c3f893943de09b7dfd0285a9271d5_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:516888a8ee8d509b77cda6ef2154a6d70a94a48a2c8c5bc7a9b1b9f2e089ff57_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c48ced70438f389ee0a22a8670db80c121c087728533c5cd2070751ce3b2614e_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:ee184be0540e401b6834747b6632b11d69269f3d9ab44bc4aaab9fc9877191aa_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:b5a8689de0cc37c38daca89e1a6f64b6601b341a8f12ef6c093ec12b83bca4e8_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:f885cac3c1b78c94885f9a9e197511c51b5470b192d6ac48e6cb20a592b36832_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:fbec65b4937bbdad28cc1e04b5b215caddeaacda3a844cd0a45ade093997adc3_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c130b6df67cd0a8ee055d9b8bb3ede4bcf211978db7cdd892f78bf1d56dd269_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:6a8227f1560751fd8e1d2ec8136d8855599727eb7ad382bd5b18167ba46b31ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c2c6ab3e7317dee023b79cc868c052a8a602610925932358498a3a215d5c8089_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:385006b34743b689054c581eaaffb5298adfd092eaa13ff6c24f28fa5b79a178_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6c2ec36725b956432591b6cb6a20d4eb2ac3bf759ab4a901f581c81bcb12270c_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:76f717cb9fe271941f45794a8dd9ebb85af0f7ab6cd104a698352b875e1b721d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2d0d4141d0df7a5309edb3aa064591479facd14d604f5338383a88a7c01fb976_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:a96e372e54eadb8c0f384eaf5295a5a17ab701c5051b5ae59341ecc01489099b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:d9135c4c5eb68af915b552e2d7fe62251f4a3a23d45a7b193d754b7da900b159_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f8b57a645d0abc3e639eb493f228d3485f4a3f53528175bc386f712fce7cd3f_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:5419a6207c0cd1adb21d7c4c3378d31f240a9f29674aee612608d015fe0b491f_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:6190c4487c63f61cb24e8d219aa1ebc6ff5d8d8b1ece5bbb3da5d46e67f0b98c_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:40f04e8634a2151e7a4aefe823c980d1d98c89ddb1210b55b4c0566bd85fd787_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:999f7119e60d578cd54b08135838fb8ecb996cd93f8e6f07ee92ec776f86f3d7_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:a8072d656eb14084eafd141690c02119376c9436faab8e4d219e1f0ade7ed2ec_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:18beaf038580dd78d44cdbd7b3e9bfab16b1ae9f1b454689abe1ebfefe4964b5_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:2e28251e1a65b7176007f53887f3693e5268848b1bb8a1e084e9f1064deaec8a_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:3848541d746de6dfacca63f06f29fc7d203dfa4c73dbd749407896ddddb7306c_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:0deeefc1600e43aac6d9eadd05b32d3a1b2059632ec7e8b005eb2245b52dbd98_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:7d1534ff8b00cd38716d2bfb65b924a45e9ec18a8eccad13c5e3818f858630b6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:b2fa794482a54fcfcbf7d0ac8597e9cb0ac0c73cfe5afa8bf2e73ca35d37feb9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:0f567016e55498bef2be33665d247eb14308b13aaef5cc670de7e06ff830cb9a_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:6bd666f6d541ab33598c4a38ac05e8f65f19e03d8630cf685c89b05f14c4f1b8_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:85bf407b6bc232952f4dd7c1edd8a7f4a168a6995d7b866f4417bc65a162efd5_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:180e2ac58d3549c7ed583da66fba14368c606feb65b4313aac3b4f889ec091bb_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2492650b89feab7de0408be0e3af6d889e6291bb7064ea524dafca87b252840e_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:93066377331da7f85024ae541440cb409c741d393adfdfe289f7d5836c0da183_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:018f6d71abae2963c853fe9d1a41fdad2df91acb72fee775af08275647d3019f_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:500d5166ea2f808c46b71d1a5470a35bffa484d860161a16e9809f90d021b23e_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:a4d7ef368efce597729c5fc1ae4358a0b45483a11b8363bf8d164c20075da748_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:0402e265ec4919aef893be4c0f177b53173bc0c50eb47aafea6822e05a7748be_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:6b0fbc1956407a0986460556336fcccfe4d08d712cc4b0af4ca65061baf75ea2_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d7546a69df7b817d0c29c8f95dd3d5d2900c3755c82570b1d610702c56d4fb59_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:6650633c4664e6b537e82eafc593dc91ca206de3b0de878f600c913a95eb18a2_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:c1c90ee4ae1f908c33c8a8bf38f0b47bfad039bedccf870324f6b554aad5d78c_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:ccddb38db49a190aa0d5d70e6b4672079ea222a42045d406a4b9974ac7412146_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:566b95595959ba60677f1518562fd996ef7643dc94aa9e9fead0e4b4096032ca_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:789f79b85c022e59143e725a589ac890884f079c969f56efb972b0a0f8d77e66_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:971a33f5a57057d3901ff75eebbc13ca8456b4315dd7811139e60bb8872d80bf_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:bcb43adee06dbb1cfb6a5c9fed71847ecc3826e3e44fe04d57b7143a6123daa5_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:dbf235a9723a1c21471d8ef0029f3c999ac3b22512d67facd052efb725431bc1_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:faf01c5554224350e4cffd1fc4ce275886791e45857bf0ed5f90ffa3a64680dc_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46293eeaad521f993ed01467e13cae70f600426ef09df0e02dd8b83348b60027_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:c3cdbf5ff93b3b19ac2d7cf15b9152a0761d473de7afe29832a7ca3b833b6797_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:ce994a8f4c4e5476e6131a6721da748225c89a96c9d471a8638eefb6a22d52b9_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:01398d4f3b1825e864ddae46a5e4b7cc298dabb444dd105787ef6aeb70514571_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:5432fa56e40dee2475da7ee7b7e89cca10a8f06f4cbea94983fa094bfbef81ff_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e22fa2dbc6733fc176f44cf42ec8f51b69672d354d6d2cf510eada5fe41a5245_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:0a0a88fb0138cd6de2e3fce81ab959d12cbda64e5fbab1046008aee1d94f12e2_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:7e0ee17c6d00d20773799cfb6c6e9e27c204d1e31010aa71a7f0f35eb5179a35_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:b9213f5525ebd51960412c15d416a591bf23731b6217f79aca2a89a893df2102_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:431d4089a4a93c6b6a00cf9b63ecd9199a5545f09190577356b22ff6646820f3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:83f649b506ca698251c884692307d7cd52bbae87b0bf7790f96ffd24dd7f4fd7_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:d37401c5fb672c56004f75974a4069d5d3b6c5e96ac7be4c174f9f178a7666bc_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a311c6ef1099d2370209bbbe30cfac6d1c50d79a2321beaab1f6158ab2db8bec_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:e666154a539974d0cc005bc74903dc9f173920101dbfc5169b14a30129991475_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f37fe856571112970ae4786d313bf51e78b26e1630e443d276abb4de8e47e525_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:1dd235aa8599ca070f5175ad9da5bdb9505a7dfbbd87173f0bbf4e14ca0d5e88_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:8a1eeafb2a738aecb2723889c98e287638e950fec05425f1fe132ff7eb01738f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d458a289528173a07f7ff6d87279474e8379a2f05c11d5a9be97f9c43e38ec75_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:45d046d621eab996c457a90b607ca9a57e2ca5dcad384d3cd5317475e096e098_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7ed02712f2d5093f7c751a6d22c9ffe5ce3b00c4cc901ffb779b8b51e282d698_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7f89cc6647700f7ddc46d4fabb4b3702142aa0fe9bd23026eba98c704026e9e9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:27492dfdd71cc0bae6e01a184ac8fe5677ce172583b0fd1b9112dfd789009839_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:3af2802a89c09966e9c63f40974d8554a7b7b88cc386bbf5bda0a4cc987b7c15_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:723ac91ea8c130d80b48db30e05186607210aea71c7afc1c072b9a691e350215_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:09883ff8a783d3f83e1c26566555c5ad140cc8bbf0d4cdb5220ef344c6282752_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:4a34b2593897d4b1a1af124bdf6fb7e51bbd97bb4c56dd8ae463b3f3abbb7718_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:883282b801566b5a40a32e33ebc431ac1398afb68f47ce931cc82b8b9eca1e55_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0a15e49232c20ead26ade38823cd40d785e612670a41cac28ecea2066025a3d1_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:0ecd46eb89e90d787c442fd0ca92f84e9bf7fa6c2e315a0b95912616687c0580_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:bd148be0ad6ddbcc1995f94b4660d3fbe2338112230c840d77f53a564b14ec4a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:4bdca102dae861d39d81a2df4be1767e4e702ce3836224e9b875f613d1af0c37_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:d71975de4b1d6b53d19ddf338f3d19ad7e28812f8fc932c144eee630d9cab176_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:fa3e2e45501d661f4f724dea809b6eff73455db623b03178130590dbf317dba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:2e13c28d1f18f2efac62207515450a42732d4be790199ab0e5ddf2f181649cb4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:50dc29deac8efaac3bf321270b718dec41d8b80746d3548c076ab26b2c6b63ca_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:faae7a0632b10dc9b65af7a8af7e7c7d9e26f2f7087687fa19d2afefa7426c5a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:1fa2779aab32977ec8e867ed188dcdd66106986c3cbf39f02e2a555873ba478a_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:731a4f0919cbab729e9dded9e513ec4ad5e1b48967c21f65f3b494158a6b25ba_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:ec803f14f854b73a873f95027617246888ea28029f2f4bb5b7f39a5dd63399ca_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:75504c269b3d0c2af9b48317f3dc070fae58a1e46e95283e2e0e1ab6b60f452d_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:c21ffdaa0ce90e6c08f4814c09d9a0bd34d341ad1fc8f6ff2152e9007393ba1f_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:e1e522835d65503d467dc9ef7c4a0149adfc4cbd3620134adb4a5694eda2f0c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:37cf6ccd9a2b9af4444fa192e7b5e6979687bd5159d97f48da40c4f9bad249eb_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:b8dea0eca4c8aaefee6be9afea77e3302ad551f68f5a87316caf65e13ac9138d_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:d173cf78965bd026a6333af91b55305ea9c349e630fa53548ee42d791295cd69_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:0b2cf97a3d82fb4570dee71c1232ef9998c7efcd1d9415f9f41351457802d62d_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:93e85d546c624a685221a5d0c9085fa59752105587a531c58066a856defa322a_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20c7b88c52ab9772ebd2216333d6324cba08c653135af469a9e6ccb6648d7c6_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:078b48f3746c33e0c69b11c9e51e70c220a3cc6f0fd26eb5b30534b16c6a2efa_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:0e1ec4eda138936261dc5a76a18fa4ace6082c636b30021ce10d5d4d0acea890_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:70e41fdcacd43b4e498b8d5917d0e2fb640f4e85f30b1d6646b27aee1bc8dafc_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:431149d31b309822fa9476f951ae39bde3a81cc5d17d2a79062ced7b729166cd_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:65aaebf97e8b904e9ff1520f4bc4704bc21614a7377f66a4c6776032621a9ccf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:804054ba7c65c0814307017e3ff6681ba25e62384468adbf3712418e1f3b321f_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:80950fa60359f90359129bff09665d7e94150bfbcfb048dc46ec77309479733b_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:bae2680af5a00937f0ecc680ad979b131ad65fc47c4683dec69e45e442dd38b4_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:c75cad252f1bda9dac27d1145ee01fe91078e6bc29c60b72f2f0977cea56ae9c_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:1cc55dc4ec890f583cf63c7c1d5451cd1e409dbb8feed7bb854e6970ba0e9cbd_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:98f3db6bd38eec496565558b8c81a06b51fe22ad4c5a462a6b43a61ab3bc853c_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a0a5b1e0cd29da2c215f3ce555230477ce775cbd79423c74426aaa4f7f56cfc5_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:29c84506cb42edbede5abdf086433ef003d677135fe3b51093c1fbafa6f666e0_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:be4e1ac4ca5c8145ad7488bc9f067d8f1b9f4cb3d79ac43f4addd19cc66a584b_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:fc83710377e91bec8866053bb2b9f91be7a3c25993488a6f9641e7c93918aadc_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:1587535175898f97007552a6023ef0785861271dc939a751c98db0c41c9e2c97_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:4aa41836d3699f3b8a546703fa5032a01af6bcac60465e779769c32a36352d0d_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:f7971a684bcdce02604319ecace5ba585797f116a64024da815bf3e2d27f6251_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:827351fc8036170bfb1b6d0fc15c84476c8913ae044163884ff89424e0e4235f_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a6f1234d8f90e06b88775ce831e574ec0621e487043d412d7c35d2bde6db21f9_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e33d7b73b6a7d41ef7779800af177a4557608ea87c854e457d0421332fcb421f_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:1d1c793c2bf89cb49dc4625981b4f7bc9cc827d01d7c57af88cde59adde21787_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:a129031e0e3c0e389a104f1ad15f4ecbb6382d79e19c62e7b22b31bee7021cdd_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:b549a06e14f326d196883c8168db3f82edbb952184ea4742b6d4eca78b13bc69_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:7e3245ba0f53c4c510f7151b3e940c13d5a79d8d95b203e3b8ceaca4ceea42ea_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:9fb4a62d70505c508d0d8dc158f8fa1c759c23f6a13c6a069a40a32c5cbce1fe_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:cdf817bdb70737e6912e550fa1602bbbcaa5b34a2e2d47a249000aac560cc6f0_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3ca37dec679c11f1333c5fd6c866867ce2e7ed5d3c139c2ad8f3ad7d10be70c0_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:45b0e1027807496b3c2a10d8e7c015cc91cc77b9832639adb51a6e5fc7f5071b_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:6710d98fb67533848a96f35fcbeb0adf6999a7e6534068ccc9956105a4d2db73_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:0fbe6a1234544b31be5b6ba778895d31b0486783116796e0e31079cd2ee9f87a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:494e65b5e3bf27c3bae221db5154b119ef7689b2cb42894f05c40cf4608f1da6_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:5d614eda176a91d5359e8a44a6f93a3fdbda8080f2209f342f83d4816b2d0008_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:176ba84e41d3465826245fd9acd199c0b292c25a76c88bbcab8c07d93829ff9c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:3857111bc468c7bb79a7476d6bc5df0add7d8951799b65b6414f1f5dd3d5b9b8_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:52a2dd79f67b1910a7129f70ba18b48656cd41b2a15f2ae4af2509c0eaa4205a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:2d64646d663ac682a087fc69314bd72751ba2b005ab08a93da223470a863a740_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:74ccabf407b668837238eb3ad2e536fcb0b3df9a48741f43edf2456fbee80cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:de9cc78ae58b063980c0fd3797cc6aba79bedc22898dae3fbce64c94dfd82909_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:37c5344f9061f44ea363d64c2118e791999007ecdead8d15c8c121aff83631fe_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:98fb5b0965d41badb9933eb0fc23a5006c1e1cb555a8b80b63a6a00bc87b1c7a_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:ff9c98d5836007520ff971116d5c143b6e0fafa25e5c8f0dfd4b1a23f191f1d2_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:13b61bea54f6d67fb749852d48dc6a035ee516ed5f3d339619b97924e078ca59_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:210fdca717aef2b4159e223a4f0bab06cdae9491d2c890d63710cf3c71de0c32_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:5f3249435b29dba366242d6e68e6f1f2f4a8f4cd8941fb881d297bd5ed9fa72e_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:2203d5c5cadd4be391bba00bbf8a588e930dcde7c438e15c14ed0e7a3fd31522_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aa0f257b502a6fcf1d2eb2270858f7d145abee32b9a64ba511bab22218b74e0a_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:d4a81b7b29b9a76aa631ad26471b3cd6202775853f5a2102260c4f1e339cdfe0_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:0faded1f0229ce80be36090a54ed761f1c89b414e84bd11d680fbddd382a986b_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:4331c06cda7427491fcf5061f9695ab5f87dea5a02b5b915b1354c20f3cff830_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:514d5c15aceb07e72ba74d9ba1b3bdc2e84e1c4060b2facdb886809b118c704c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:2da6d891769a4d9cb936d93a8ea84eea45f33e482c79cc74418f4143c5c145e7_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8c0745aa13e06c6cc159d8be33302b766673bdd1aedff1309d205519587440ab_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:8d0e265c199c32e757c2004d89db64bc64092171b98068aab03f977a744cc5bc_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:8036c9dd2d44027f5173b935ee8dcd9b3e87b433d65a50f83ffa76a503cf747c_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:ed22c2650f0d908174896647ced911a49945714a114836096b787cc879164bc4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:fbe3062ae92faafd40caac5ddd0b20e2d1bfcaa64febebc0dcd5d368a3734c12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:0b3c2d30d0a6109db50dba4053d795fc92bfcadc380a8a8deb5ae4ef4e6d29fa_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:6784f7672ac4c8f47ddaf9b5fc6b98f2c1d18c48be212114eeab9babb780cba6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:ada830a6dfa3f00aba2a32225a9884bbe31d20b93ece21249b11e6b037d85e75_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:31244fad1da3b5c258babd12defc1192a8534727f12ad775aad9d202fb6a5947_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3ac9147cf782a40b3881973a399add430aee10cdfe1abdb00c98a0b5a3a527dc_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:9d00b2d06752192dd8f8f48aeb2786ac1ee0c062ed8916cf3f693c7d2a05e208_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:30e06b75f83e22faeed2108f68b158fb35b4db22b83f049c61706ddcbfef27d9_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:530aedee3aeca43ef0501f5cd2aa07c65eb708ac1a7fcd97fc3000358744d1bd_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:c5621b5d113a1330bdc04f1fce05fd6f16c10526511ba207cb24551f7efe0e58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:1ab81a27373c351eb2c932536fc9ea6cbf74911b794e3cd183c8e5624940a656_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:90ed24a800b82c2eb1c0f2d08aa11b2bea942e6a9044e3a01a5778877e7b376a_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:9e02a53649909a9d3ccd5c22f5c231b3ad69f451d7b5a32033046f3031cde188_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0facf27d638269e722029217ef72016556c60e42887a836e4a0ad6140c1b6dcf_s390x", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:5694a214f662b4556b1fdf088ef0d33d6674dc3be3ae5d2fbdf00e56addeae3c_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:73b036d1c7b9c44010ef9716be8c96bfd2a7af7e09b2cf3402cc2aac81ef94e4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "vm2: Sandbox Escape in vm2" } ] }
rhsa-2022_7313
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.6.2 General\nAvailability release images, which fix bugs and update container images.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs. See the following\nRelease Notes documentation, which will be updated shortly for this\nrelease, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/\n\nSecurity fixes:\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* passport: incorrect session regeneration (CVE-2022-25896)\n\n* sanitize-html: insecure global regular expression replacement logic may lead to ReDoS (CVE-2022-25887)\n\n* terser: insecure use of regular expressions leads to ReDoS (CVE-2022-25858)\n\n* search-api: SQL injection leads to remote denial of service (CVE-2022-2238)\n\nBug fixes:\n\n* ACM 2.6.2 images (BZ# 2126195)\n\n* Infra MachineSet Replicate Taint (BZ# 2116528)\n\n* Work agent panic when apply the manifestwork (BZ# 2120920)\n\n* unexpected difference of behavior in inform policies with lists of apiGroups for ClusterRole resources (BZ# 2130985)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7313", "url": "https://access.redhat.com/errata/RHSA-2022:7313" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2101669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101669" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2111862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111862" }, { "category": "external", "summary": "2116528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116528" }, { "category": "external", "summary": "2120920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120920" }, { "category": "external", "summary": "2123376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123376" }, { "category": "external", "summary": "2126277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126277" }, { "category": "external", "summary": "2130985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130985" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7313.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.2 security update and bug fixes", "tracking": { "current_release_date": "2024-12-18T00:37:26+00:00", "generator": { "date": "2024-12-18T00:37:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:7313", "initial_release_date": "2022-11-02T14:05:53+00:00", "revision_history": [ { "date": "2022-11-02T14:05:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-02T14:05:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:37:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.6::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.6.2-10" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.6.2-5" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.6.2-44" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.6.2-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.6.2-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "product_id": "rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.6.2-18" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.6.2-4" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.6.2-5" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "product_id": "rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.6.2-7" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.6.2-10" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.6.2-5" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "product_id": "rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.6.2-44" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.6.2-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.6.2-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "product": { "name": "rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "product_id": "rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.6.2-18" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "product_id": "rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "product_id": "rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "product": { "name": "rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "product_id": "rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.6.2-4" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "product_id": "rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "product_id": "rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "product_id": "rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.6.2-5" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "product": { "name": "rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "product_id": "rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "product_id": "rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "product": { "name": "rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "product_id": "rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "product": { "name": "rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "product_id": "rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.6.2-7" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.6.2-10" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.6.2-5" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.6.2-44" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.6.2-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.6.2-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "product_id": "rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.6.2-18" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.6.2-4" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.6.2-5" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "product_id": "rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.6.2-7" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.6.2-10" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.6.2-5" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.6.2-44" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.6.2-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.6.2-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.6.2-18" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.6.2-4" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.6.2-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.6.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.6.2-5" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.6.2-9" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.6.2-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.6.2-7" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64" }, "product_reference": "rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64" }, "product_reference": "rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2238", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2101669" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the search-api container when a query in the search filter gets parsed by the backend. This flaw allows an attacker to craft specific strings containing special characters that lead to crashing the pod and affects system availability while restarting.", "title": "Vulnerability description" }, { "category": "summary", "text": "search-api: SQL injection leads to remote denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Advanced Cluster Management for Kubernetes (RHACM) the search-api component is protected by OpenShift OAuth which reduces the impact of this flaw to Moderate. Access to the search-api where queries can be submitted requires the user or ServiceAccount token authorization with a granted access to the resources and managed clusters.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2238" }, { "category": "external", "summary": "RHBZ#2101669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2238", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2238" } ], "release_date": "2022-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T14:05:53+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7313" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "search-api: SQL injection leads to remote denial of service" }, { "cve": "CVE-2022-25858", "discovery_date": "2022-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126277" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the terser package. Affected versions of this package are vulnerable to Regular expression denial of service (ReDoS) attacks, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "terser: insecure use of regular expressions leads to ReDoS", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Do (odo) product terser is shipped only for using in static page generators for upstream, thus this represents no security risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25858" }, { "category": "external", "summary": "RHBZ#2126277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25858", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25858" } ], "release_date": "2022-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T14:05:53+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7313" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "terser: insecure use of regular expressions leads to ReDoS" }, { "cve": "CVE-2022-25887", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2022-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2123376" } ], "notes": [ { "category": "description", "text": "A flaw was found in sanitize-html library. Insecure global regular expression replacement logic of HTML comment removal could lead to a regular expression Denial of Service (ReDoS), affecting the availability of the affected component.", "title": "Vulnerability description" }, { "category": "summary", "text": "sanitize-html: insecure global regular expression replacement logic may lead to ReDoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25887" }, { "category": "external", "summary": "RHBZ#2123376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25887", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25887" } ], "release_date": "2022-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T14:05:53+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7313" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "sanitize-html: insecure global regular expression replacement logic may lead to ReDoS" }, { "cve": "CVE-2022-25896", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2022-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2111862" } ], "notes": [ { "category": "description", "text": "A misleading session regeneration flaw was found in passport. When a user logs in or logs out, the session is regenerated instead of being closed. This flaw allows an attacker to use a previous session in particular environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "passport: incorrect session regeneration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25896" }, { "category": "external", "summary": "RHBZ#2111862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25896", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25896" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25896", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25896" }, { "category": "external", "summary": "https://github.com/jaredhanson/passport/pull/900", "url": "https://github.com/jaredhanson/passport/pull/900" } ], "release_date": "2022-07-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T14:05:53+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7313" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "passport: incorrect session regeneration" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T14:05:53+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7313" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:24867997344151f0a71116f5bb52f4afbc4d33dc4333283e9abbbb92fb060b8d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:75f75a8df153582865b4463d28ace52d063ef7b9bb0b69fb3f917e17c0fe2fad_arm64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:9dd7b1335fce4f5a03b8e425bb9990299dfe4b8204c4710df048f43df02d5a1e_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:edb685810550793e4305afafa747a9195032be835dec3284add7129adf55cabb_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:259617d9028e93b7e57ed47b51f0314744a123dad516e62ad68af91beaec57ae_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:b926926c9d3343d16d3945bdfab41842fc11b6c58eb2fbaaf53b02420c7b3d23_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:c694411dd268ba6864ee2204dcc941af17fa56baa1ba2d856c25974a53d98f2a_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:d5670862ad0ad01c7b1446381a02d112c80bf3b714392a938d05fb4981c40598_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:206442cf3e5b9609792859160b1948b69f7d3f4e9da7ad8b2f470e3796a77a06_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:2e81bbe652bdfbb3e3e2cf0f8a8f30558d4f9150744813a0706c0d2e3efbc5b2_amd64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8cc71196bbda56a06a87e9f34c0540891744b4408ee8250fd56bdc734b173c1a_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:b0235a7a5abff5d1f698eadc79a2306863b2fb45fe48bd33c7aeff158261687f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:12a06b081a8cdea335f7388112994ef912e18a54110da80fb56c728164666609_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1a13a09057399dba15b6c1cdeac3736166118d84a2abfdbf51c6ff110b3f3db2_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:cbe87239081681d5f8deb8600ef2a1081b21b169f646bded7d9a0ae40c4638c9_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:fa85d1b766139c3a81d99c3610220d6d256e8ad6be5aaf38e6a3c4ebe9bd4fa7_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:36f8bd729d0cc59d1f63a610fc5baa824d6fad971cf2902c663059aba2a2f924_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:af1bebc2990011d87272fc66ca9ac66445b590c974a13b699fc375be00a7303e_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:c7a8ff2bbbbf8dc2db16461ed6f38a4dd7fa3fc7f67d814f0d21081356987c93_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f2a53040b14aed57d2343f2cf194cb11d5e608785dfdab44fce4a451a0125a11_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:1a875a1ac7d8fea967286ebac6051455a9c650bf838742b392e375128b972a31_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:2bfebab46ca047e64a5c1e2bc3d996f898a3663d8dc2ade6888f7a4761757f67_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:5391c6c232e1e6ca30861ac8074dda3886d20320b5eb8896c184edd5ea908a7b_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:6bfdb670877ea0329591d957da7ad8548fd063eadd55bffa63ff246b7b7bdd8d_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:15b11fb949e87de8fd76f60464ebdc3450da94c31122d934de9e343de733b8a4_arm64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:216892dd9244e0681aeb45532f2648c19727f32f92910e24c0c8a07672eccc2f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:36f8aabed4c001ad706d8e4900a2cb2a409cf78a3a594d8281cc7dc2b74021fe_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:fc445d96351ac646ab3ff3e0ba5ef32c5e90ceb8e5cc1b133d5075b20e8f3f19_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:77f5b771a84faf438de7907d5347f2abe826ceb97566059a08b99fe3ec96db88_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:85e261a4046dfc1632042911493c64c3dfe99ff869fd34dd28b8fa1aa46a13c3_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:875bd493b369f6ccf71630efb975077200eaf5ff2be9a993a59e011936d266c9_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a531c4d9ee033a5355ae335988cedc7c68dd5a37d3069d7e140d3cc6203736b3_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:2b6e19b12927aeac09c724a56d4ff6e63c5370b012a5adb5d9db0c5ba4c93c34_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:a69c76a3f4d73b8f0156460ea84f90b3ea4dad930eb98fe0e6d2c5d04a63806b_s390x", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:ac50d9a5b85f1d226951cd53d25c79847285cb3a9ed9244f0c504d932369b2c4_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:e58725143a4591a0d0825ef1483896a3c8fac697c02efc610c8c0f4cab92b367_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:1fdf6cd546003fab499bb1cd751ac83b5c7a943e8114b0a8571f248560a42483_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:7d94724bae53b5c245709c7163891b3cfd17f5d980f2b8c6dbccb81d072af1e0_arm64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:b6d54d3bb2bd17cea60c2fb0c290315a12a4adef787766d1cb4968af517c6333_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:c09a63f4229b4363032756c3e76d8f46440b9fc840e951050109d9ce0827a94a_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:34ff2f8c305ff02eddb5f857b65dcb55fcf571e078f82fb8729278f75aff4198_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:61dfc3da23b92fa10cd0a896bca2f1c95b09c62cbcb0c00a87600b73b67e6ee2_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:a48cb8ef04afedcaa6dbb34456156caa1b2efa799888b1d133b34ac3a6753dae_s390x", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f6b5cb65f62232eb9d99613e1cbe6a55f79588d650e938922cb64ed2dc03e1a9_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:0a78955c5ab8c52ac5f3add4cd00dbc429c8e162edb5cfa9b4429df0893ff34f_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:446e8134e712472dc831dbb4f1235d28a2abebe0f4bfba2287a98ab306201129_ppc64le", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c225345255a72856a55043449e53484b96dfe5341cf0838c08d141fe5fafda57_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:f77ced51f6e949642ca96e3139116569506d70f5294db5f0e301c08aa1f3e011_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:5937b9574183059547fbecdf13cbdaa82ff8aabf8a2ba39bd39ddf627d7efe5b_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:7d6fcb2f23a1701ced8566b05a4bb9244f544e88d1c0d326010821c267788d48_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:d297a6d035840fa2412410abac174271520d18173c27c6b313f35a74be705344_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:fdf112ea1254e9639c85d185e9836c02f22c1d0194e9057ce218dc9584c95957_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2fa8c1112ea23e816feca297279022b917fa0638b75613cc16f09f1689d5d215_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:9fc12a258e74b5b18277c8fce31579774c644b5ba9dee51fe9dcefc11ff81400_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:a5b35703265cdfe2da6461e0256133ca9e0cee8007acd6a21f3dca014ea35a7a_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:c353d73af74b341b890a44aa7a2f0b594b7fcb6d90c2624a7035938589d58c96_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5518ef77680792bfea6ca102e7c4ebe0e94d8e2433ba48fad1be54fe54db76e2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:5996a6f420cedff4bcc6e10f0e5fd962a89d48a8cd7ebad02dce836b805d2260_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:a030f532d98b76bb805508352ea03f9517ca92fab0109afca72d75c0d22e38bf_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:dcdae1deaf6efb4b289607a39bb1b04c8653f247ce1af91bca16cf870227484d_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:1f406ceac2e9c81bee6130049e1296054a9aa2b73700782247c172de5a4b7671_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:4cf586fd39632f3a8a76534c816bbd0d6cb709feaf30f45c1026a4d93a3c2cca_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:c3d4ceb96a42169ffc2e7df48df6c57361cd1bbd49642348da701fa3aa4b7a35_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:f25209716d29cf557ee3ffeeb5d8aaa6d9ec82b2ec895acca32ab44f01435701_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:3b382fae661eedd1650edc7cb5a16cd0761524510db27a65f12cb99f360bc979_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:732f1d0cef3ddaaed8fdcc35bde4461a6ae4e55c2e87fff8ba3e03da0f797b46_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:ac4cee6520166be6864c8c5086831ebb8323bb8de3e8a5374d33ee973a5eaed9_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:b6000d70b4550318261a82c2b6578304c6200c4ea11634c07ba3e3316b35ac56_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:16139568f12dc5df1bfcf9656f2b9677233654369a58be49a7c3ff5d5420a80f_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:38f02fae8edf51b1fe7422d10f7982b7086d013796bef05627f1c6dd2c946a45_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c8424539be097aa4b8d156d19ad47172c37c89e0ef669eefc15012a3301ac9f2_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:cfc953aeb56d534067cc919cddde92d2b3b4563c4ed6adedc3bc7d8324799aca_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:1a8638ab54391365a8ab9780a4166bba8bdcf4607f8ba884f0e68ab048a72992_arm64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2393c98b3268517fc706ae97c8e87bcab27e7bead8aeccf392ae4c757f4dd870_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:7e51cf321c2c9170831809a3b971bb281be76ff8a126546215575659ef4b77bf_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:c102453cd046d22a657bb85559da6c4287d014010c65dec53a65634ff603fcce_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:03c4e88f5ca5d3703051058ae579b7de9e4b652a6446a5a95d4107c295f830c1_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:0e3225d00fbc6611d90b700b392772a3a6e53145d7a1fa2a6a0ffa4bed3c4a3b_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:18a90a61c5e378d927cf94b18a3549a029aa2687e65d20f4a52159d2d60d5720_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:b2c3053ebd91b0cab4540d7b1a3372829d2b4c4305f5e6c19c3ad9a0f88f1200_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:328c721dbf5b4f1bf2d1fbccbd9101903078c4e86453b1ced2c7d8756326cbac_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:767786358ec4c52db1306d55635d7ce31f65befdc4770a877dc71e3e0a8d4993_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:ea1e9e6ecd9e10b37fcfa84437831cf07ddd794889c670d33ded954645872650_arm64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:fb40d79a44a037d555a03feacfa3346e5b1edec62132017994c006f2dfde3973_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:344a2f7fa01eecd2503790648d697fc13efcbf2ed2a0dde015f6c4aba563ffcd_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:5cbe00475ecaccb036ec21b9cade32ef1d45122b503ad45fdf2ca80a0db6be88_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:61208bc4fc0096c0eff56782bc2ec8547555baab156022db541809afe8ef4b8d_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:c2d175eca0c190b86af67cd559a8f8fc6025899971bcf7fcaab1da060b299582_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5396eccbc165701e4b9ac50d9f78936cfe2b2f506cba1e2950c84054639ba764_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5fed3dfaeb54b7a2bc5f637cfd9b116050d8a685c2cda8f8e7d4b70a9b89ef20_amd64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:7ec74b91f087e1a89c1dba65ed8a42e34c63717e947148b19c2cec810fd61b2d_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:a648d97527de9eeba1465c6b2f1dbb1f9b86f1e3f44663a1d5ec897fa72b9708_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:3524a2942d3e6b5de75f2a6c8fe4f560eb56f97b41d3eb9425f0d02cd45e8624_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:59a15469e44389f08310a352e639340937edb2d1beb706799ebb2b7a68fd13e5_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:8532d19655085b7a4ee8ed7dc44dc24dec95f61538315adced47d02be4643f03_s390x", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:ad37a94d2f9f3546663900d893860c2665fc8208a38e4a1b5b0964de8d80cbfc_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:48bfc7f8918894f91cdfb6f116c50bd3b1ff7a5e707fc41b8ed8d2f22a5aff2c_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:4bd33b7c7ac1222af9caa5837a5a79d8ef5e89b3e55a460e5c6920835017452b_amd64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:5389f332699c281c81ef2a36901b560a98ac924a9b9b8a2ea0317e99f6b72e75_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:90c4b67071ae8d5b9474a620ce5e134306c209d2bfef54d255a26e51ef4b57d2_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:29b4790857e673d117f1f7984e95d3be7d1cecb2d3638329266f9fffb5aad002_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:2fc1372d8b01f90595ef9b4267d8b17e5739c8e22502f7a1e1c8bb5933932d82_s390x", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:7a24fd49e033282b884d0f0007844c48b63e2d6809126b5b4a2b725b71fdd854_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e28875f56c70ca74eba19c2c78dc073b22c335736025ed7f84b4d3d8a37cf1e8_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:442e9bec7d47c2a6dc67d0cd698d86530b1f9df66ed81ebcc1e47fedc913ff46_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:999372f9ab5ff1743e29f03208865be9107eb3726e5a83e920193a06f1306184_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa7f5ce6b5c65b35c843aa1cef722e199c7a8d6511c352b26cd424fbedc50586_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fdc496eb47a844921829c7098738eae817972a2f8b4ca394a5b837eb257346a8_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:10c4b9d15b2d6bed2fea0700f9ea9584b8c0a12f9387b5ba7d734f317c6494b9_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:12e37d96bf4950c4c1daa0bd5d7406c75cd8876c8a14b4f016fa264ec06363d1_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:1c89f76cbbe75559ec6471c88a2b60b58da6c6fb1b727e4b01405329ce7dea1d_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:33c10982ee9bc452368dfe3edbc1f9c8d7988528c03c5fb863e3fda5909753de_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:1acf24ad427c3712b230265789518c649c081ce454d3535cf23c96d1b5356810_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:9f0073af0c977b1cb8345dc808ee945c414f6f8bc03b3325e28d72bf88fd3ddd_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:c929629780b8d9c427f091d5e8774809c30e5ab4a8d6836a09858899439fd0d4_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f74a281d3014a268fcbf261c0b3af81f11c1ecba1e63cd6e4ec2983664bfc4d3_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:500535d6aa072c0f0d5b57000ae42c08b1f0b6ea97e1b3cc482db1a0487a7b6b_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:8f2c56f2de67173ae9718e86df0d8ab0cc57235640b337d2599c3dc8b952b815_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:9f02d86c5e6172b121899b466b5172dc1dad7062ea7ddc877dc2d40a44a02a2b_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:d997dc41c42ace873876c98a3de68ef7dbf2f4cd3061533907862ca4e008bc37_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:7f7c1097e0c140670d3657def7fb2105181010ced7e1e8e67fd69fb42b231fbc_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:a8839103eea40a28c9b938f15722e1854203012b1acda0d2745d8d063f8fea05_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:d4aa1126f6f26d9ac04fdd791a66320283a35de5a9c35ece72792575537289ce_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:fc8e38ea3d048eb6a46a205f207e6fc4eab8f41f5c21ba206c20ac923265a512_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7816264f6af779845217af608cc9b3c9d9625286039417234a74938be3ecf18a_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:9ca12927f94d34d20bd41e761c7e2800fb9149572a2881eec183a8321c409222_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:b117eb7d70b47b309a6ef079549f4c581a1bef8963de4386095db72cd128b8d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:d0bd5fff80e442ee4b397f1e2794a42b834957020a363b46c65056c5fe9d7bbe_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:1695ca475d54e3aa438751d81eadc8ec8ec5203157f97b2473ff7095cd2c0b4e_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:5ee1aaafad31f7f5409895d448e3ea36761c4f368c91eb861700232b9bcbc9d5_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:684034ec6de74d4216155bff9a503ccce8e681dc47b1b9e52c62ae57300ca116_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:b71f4a0c6f78b4ea9f32a65b5c5818d27c8a1ade552ef032f9ca15825aba3faa_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:509dad890cc6e28e3b949f40cfc1b8e3a10b19555de1ec874c6ffee743d71156_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:7f93d2b94b0cabaf600863bb5345b741add28603b81e3fa52a12b393e0a911b3_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:9974572fbff42b202e85cc34bd3f13957ca224d44ed2f7590bf03835c0bbcaa8_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:f9c1c1d696f1a9d25f3cea9cb404489f9029ad3405d5d0c73898b82cab702486_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:0f2d894f169406767b05b6b740a60bf4bd1341aa320f8042a4926692bd7e9355_ppc64le", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:453c8c96e8cb8a5b8c1d5ca9d1758fec30f007f1251b68487742000e12ce8f0d_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:d75e967fcb4ec0d79512488b59fa83c89745ea90ce6a75179aed9f5e67904b13_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:f8188a9bbf9cb2c0964a9e7c601315efefd173ff4ea38d726adb5c9a541491d3_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:530cad0b16489e77dd3e1732e3b0c31b6c1a6edd47c411e1322bc0417768b11f_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:6e4ca62a18449b1070c5c57965539b52ca750720f22618a3243c56d73ca74968_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8219287de91ec4cbb5788ffa23992df0aa37f60a8b8c2d2977e48037e8801251_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:cd6cea60ba63acda5b9f4c99cf63d08a9a8c7d3a9d07e41d3026a734605eee2c_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:4c1cae7854c53d359603ccc688d3dccb90df2fe7164483cd519adf1f48ca2fc3_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:58e00463bd083ccbc32fc4d290aac039ec4c7c17860ed14a9c252a4918a46c6d_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8327fc88a0779cd3ad0264680840f241625310138e43954d715f309d7355ffa9_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9771eec24496c7aa6ff0326f75f4f87fab1e1dc718bce8a595b701a17b4bf9e2_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:14d76f4898fac0831e44ae0a4bca331ac01142ae8679d940dbe6c52370fa275c_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:3bf8b36453dfb24ea469578c98d718d60617fa42928f004fb15383f802896689_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:50731ae0c2dea5ae1a36756755073390a1d720276f6b40d476856d76eca19ffe_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:8939455688be67a53122a38cfd6a6615fb0cc6a65b0d9466fe59ff6e6d340738_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:3f37cbea80a47803806e34094fb067f19832df9461fc7836fa94534932ac3d7e_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:477336cacf3d9cb1ff77904c5d6188f36663a8b7a0c23fcd81ea5c3d1a2831bc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:6125e9bb93d5fa1d7bf1e9fddec6b41b53be5577681564d7ac402163f8cc8ece_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:7058f06597d89e69592c0ffe0ad471900f116bf32e64d6ef75a79329e2d2f363_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:17a5fd1a44c24dbd45397b23e52fd946ca7d76d14b6198cfa37a8104cf79463a_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:27eee91b16d5ef91064359136b3358b86c53925a5b9a7a30e87d4ec8353fb983_s390x", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:995702d7d52e74a8be42c59a1545a3de3f9c3f373eeb7cd96cc36f45ed3bf2fa_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:b68d7aa91c8203875ef0b1117b3a9f8db2847238f296c94231521cd4f85075b5_ppc64le", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:1a6ebf73f8064898ecfc72396ef39544df85876745eb1e253a06e4896d4f5d13_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:330c0ce417e900c7b7f5137ca0e760c8e369affd1c738df94c563a3e9f2748b6_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:6331e491f8d5c56bed9302c1a25ac147408333faf217e28b7c22b1f8f29ed257_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:cf83830bc0fffc4fb5073acbe950ac163ada006485da9b258bb9058d7541ae02_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:4019df8e0608e322466d7af5dfed94bd9712ebba95b8680e1b33b89224be8558_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:51df281dc77c9d1f2831387184340c5160783e2fd62caa70c28fbb3729cfbc8c_s390x", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:71e3ebeba3484088dd4aabda7c88ef9aa464740c3de67258b80c20f6bb589b73_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:c5155fbad1884aa4bf30f1a3ecd006a42da4c34ef22cddc86d2810fcac3c2f5f_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:18a157f397f4e5deccf4c888beccb5bcac22b63c9b1044bfb215f64b37f1b384_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:490aba75a77d0d9057f0ec8d850788a3a90c2184b5253f0e5defe65e93c9e557_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:cbce0f1cbb8c99f126db91e4ffad6fc0bd8dceb35c756f92349bb618ac1a2d2e_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:d7c8cf6226f50d6d6d2a8957f5602b939f350070b11fe005ee745fae4bb8e5b7_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:04de81dd90987bfd29ede97e8034ba8697544ffa4d99e25e580c386cb150715d_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:2eb7c2bcefccefc1462c9d57c834f7c6a6bbf700e949dd2702d6deedc08bffbd_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:9318b57301cbd61e501e3bd41f844b96140b486d4e262ab1883355e3728d75b7_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:d3ba77213bcc9bf2e5c0b25c5b57bec8e2f8616ff3d529a3c1de965ca289a3f6_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3e5f20c33ac0bf0eae9344ca338e373d6215a320e86590cbfed2b9ad8fd826ee_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6686de7a4a17384b5860a29ba9441d7be22a9c226f7795904a51c22ae3278220_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a236785d3aa9b0d87f9fbe1f15eea661658bc083dba0c74c3ea389b1a7be4b2a_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:a4d45b1f2f6886329235477678fc97de989540cb6a784f351c676f3e4ffd30cf_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:4b117245a6430294df24c6fcff7e4c09f5cc57b5e67e86f24c01125b2ac2a84a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7c472e1068c06f43130ba8136a0443cc58f5806f7f585be3870721b2399d6567_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:904c6f8a0757dd20fc1e3e94d1d05f0af472c1e3720b5a45ee1e9e55c0469177_amd64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:d69c4928deb84402794b3d3c8ada4257a24afdc49387a21d500ce9ef1fd1facb_s390x", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:3e08edb6276e226a8443c0ac7c9402b0dcb740f11e0dc610bf5c4420f530b2d3_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:5ceaab70d3a9b7bb021f7bab9461aeb9b94c1d5bf9eea3f7a859ccc79d663902_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:bd7039e887e8e8fc244c5ecec0a9b76653f77092df1394923edacb516bf070f6_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:f161fda98efb78be93d5e64856e9187e8407752705324355a6a0e26c49fecc0a_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:090c62e4d6d40536a0bd6ac8b9173188db6192a361be7a0425337f34bf4d45c9_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:40fbe2bdbc72134d54a9d28c36fafb8c7c0238c6e1517b8f12517698aa4a599e_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:e953144ce6b154584462a776e584f3ac57f9c3b21f86467c06e499568cbbbfb4_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:f3ed4484841eaf75ac1c2be02e30e2e1b614ef57661efa0a90ce83157e0d8b40_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_6156
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nSecurity Fix(es):\n\n* eventsource: Exposure of Sensitive Information (CVE-2022-1650)\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* nodejs-set-value: type confusion allows bypass of CVE-2019-10747 (CVE-2021-23440)\n\n* nanoid: Information disclosure via valueOf() function (CVE-2021-23566)\n\n* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)\n\n* follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)\n\n* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)\n\n* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)\n\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)\n\n* golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery (CVE-2022-24771)\n\n* node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery (CVE-2022-24772)\n\n* node-forge: Signature verification leniency in checking `DigestInfo` structure (CVE-2022-24773)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\n* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n\n* go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses (CVE-2022-29810)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\nThese updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these updated images, which provide numerous bug fixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6156", "url": "https://access.redhat.com/errata/RHSA-2022:6156" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index", "url": "https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index" }, { "category": "external", "summary": "1937117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937117" }, { "category": "external", "summary": "1947482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947482" }, { "category": "external", "summary": "1973317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1973317" }, { "category": "external", "summary": "1996829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996829" }, { "category": "external", "summary": "2004944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004944" }, { "category": "external", "summary": "2027724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027724" }, { "category": "external", "summary": "2029298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029298" }, { "category": "external", "summary": "2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "2047173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047173" }, { "category": "external", "summary": "2050853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050853" }, { "category": "external", "summary": "2050897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050897" }, { "category": "external", "summary": "2053259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053259" }, { "category": "external", "summary": "2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "2056697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056697" }, { "category": "external", "summary": "2058211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058211" }, { "category": "external", "summary": "2060487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060487" }, { "category": "external", "summary": "2060790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060790" }, { "category": "external", "summary": "2061713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061713" }, { "category": "external", "summary": "2063691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063691" }, { "category": "external", "summary": "2064426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064426" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2066514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066514" }, { "category": "external", "summary": "2067079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067079" }, { "category": "external", "summary": "2067387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067387" }, { "category": "external", "summary": "2067458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067458" }, { "category": "external", "summary": "2067461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067461" }, { "category": "external", "summary": "2069314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069314" }, { "category": "external", "summary": "2069319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069319" }, { "category": "external", "summary": "2069812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069812" }, { "category": "external", "summary": "2069815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069815" }, { "category": "external", "summary": "2070542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070542" }, { "category": "external", "summary": "2071494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071494" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2073920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073920" }, { "category": "external", "summary": "2074810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074810" }, { "category": "external", "summary": "2075426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075426" }, { "category": "external", "summary": "2075581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075581" }, { "category": "external", "summary": "2076457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076457" }, { "category": "external", "summary": "2077242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077242" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2079866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079866" }, { "category": "external", "summary": "2079873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079873" }, { "category": "external", "summary": "2080279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080279" }, { "category": "external", "summary": "2081680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081680" }, { "category": "external", "summary": "2082028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082028" }, { "category": "external", "summary": "2082078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082078" }, { "category": "external", "summary": "2082497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082497" }, { "category": "external", "summary": "2083074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083074" }, { "category": "external", "summary": "2083441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083441" }, { "category": "external", "summary": "2083953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083953" }, { "category": "external", "summary": "2083993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083993" }, { "category": "external", "summary": "2084041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084041" }, { "category": "external", "summary": "2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "2084201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084201" }, { "category": "external", "summary": "2084503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084503" }, { "category": "external", "summary": "2084546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084546" }, { "category": "external", "summary": "2084565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084565" }, { "category": "external", "summary": "2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "2085351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085351" }, { "category": "external", "summary": "2085357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085357" }, { "category": "external", "summary": "2086557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086557" }, { "category": "external", "summary": "2086675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086675" }, { "category": "external", "summary": "2086982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086982" }, { "category": "external", "summary": "2086983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086983" }, { "category": "external", "summary": "2087078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087078" }, { "category": "external", "summary": "2087107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087107" }, { "category": "external", "summary": "2087237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087237" }, { "category": "external", "summary": "2087675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087675" }, { "category": "external", "summary": "2087732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087732" }, { "category": "external", "summary": "2087755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087755" }, { "category": "external", "summary": "2088359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088359" }, { "category": "external", "summary": "2088380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088380" }, { "category": "external", "summary": "2088506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088506" }, { "category": "external", "summary": "2088587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088587" }, { "category": "external", "summary": "2089296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089296" }, { "category": "external", "summary": "2089342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089342" }, { "category": "external", "summary": "2089397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089397" }, { "category": "external", "summary": "2089552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089552" }, { "category": "external", "summary": "2089567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089567" }, { "category": "external", "summary": "2089786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089786" }, { "category": "external", "summary": "2089795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089795" }, { "category": "external", "summary": "2089797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089797" }, { "category": "external", "summary": "2090278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090278" }, { "category": "external", "summary": "2090314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090314" }, { "category": "external", "summary": "2090953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090953" }, { "category": "external", "summary": "2091487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091487" }, { "category": "external", "summary": "2091638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091638" }, { "category": "external", "summary": "2091641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091641" }, { "category": "external", "summary": "2091681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091681" }, { "category": "external", "summary": "2091894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091894" }, { "category": "external", "summary": "2091951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091951" }, { "category": "external", "summary": "2091998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091998" }, { "category": "external", "summary": "2092143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092143" }, { "category": "external", "summary": "2092217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092217" }, { "category": "external", "summary": "2092220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092220" }, { "category": "external", "summary": "2092349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092349" }, { "category": "external", "summary": "2092372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092372" }, { "category": "external", "summary": "2092400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092400" }, { "category": "external", "summary": "2093266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093266" }, { "category": "external", "summary": "2093848", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093848" }, { "category": "external", "summary": "2094179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094179" }, { "category": "external", "summary": "2094853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094853" }, { "category": "external", "summary": "2094856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094856" }, { "category": "external", "summary": "2095155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095155" }, { "category": "external", "summary": "2096209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096209" }, { "category": "external", "summary": "2096414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096414" }, { "category": "external", "summary": "2096509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096509" }, { "category": "external", "summary": "2096513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096513" }, { "category": "external", "summary": "2096823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096823" }, { "category": "external", "summary": "2096937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096937" }, { "category": "external", "summary": "2097216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097216" }, { "category": "external", "summary": "2097287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097287" }, { "category": "external", "summary": "2097305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097305" }, { "category": "external", "summary": "2098121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2098121" }, { "category": "external", "summary": "2098261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2098261" }, { "category": "external", "summary": "2098536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2098536" }, { "category": "external", "summary": "2099265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099265" }, { "category": "external", "summary": "2099581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099581" }, { "category": "external", "summary": "2099609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099609" }, { "category": "external", "summary": "2099646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099646" }, { "category": "external", "summary": "2099660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099660" }, { "category": "external", "summary": "2099724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099724" }, { "category": "external", "summary": "2099965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099965" }, { "category": "external", "summary": "2100326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100326" }, { "category": "external", "summary": "2100352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100352" }, { "category": "external", "summary": "2100946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100946" }, { "category": "external", "summary": "2101139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101139" }, { "category": "external", "summary": "2101380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101380" }, { "category": "external", "summary": "2103818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103818" }, { "category": "external", "summary": "2104833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104833" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6156.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, \u0026 bugfix update", "tracking": { "current_release_date": "2024-12-18T00:35:07+00:00", "generator": { "date": "2024-12-18T00:35:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6156", "initial_release_date": "2022-08-24T13:45:52+00:00", "revision_history": [ { "date": "2022-08-24T13:45:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-24T13:45:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:35:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHODF 4.11 for RHEL 8", "product": { "name": "RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.11::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "product": { "name": "odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "product_id": "odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "product": { "name": "odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "product_id": "odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.11.0-30" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "product": { "name": "odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "product_id": "odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "product": { "name": "odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "product_id": "odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.11.0-28" } } }, { "category": "product_version", "name": "odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "product": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "product_id": "odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel8\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "product_id": "odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.11.0-66" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "product": { "name": "odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "product_id": "odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "product": { "name": "odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "product_id": "odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.11.0-67" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "product": { "name": "odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "product_id": "odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.11.0-51" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.11.0-37" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "product_id": "odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.11.0-39" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "product": { "name": "odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "product_id": "odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.11.0-29" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "product": { "name": "odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "product_id": "odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "product": { "name": "odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "product_id": "odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "product_id": "odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.11.0-24" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "product_id": "odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "product_id": "odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "product": { "name": "odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "product_id": "odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "product_id": "odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a?arch=s390x\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.11.0-13" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "product": { "name": "odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "product_id": "odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "product": { "name": "odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "product_id": "odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.11.0-30" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "product": { "name": "odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "product_id": "odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "product": { "name": "odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "product_id": "odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.11.0-28" } } }, { "category": "product_version", "name": "odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "product": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "product_id": "odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel8\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "product_id": "odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.11.0-66" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "product": { "name": "odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "product_id": "odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "product": { "name": "odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "product_id": "odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.11.0-67" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "product": { "name": "odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "product_id": "odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.11.0-51" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.11.0-37" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "product_id": "odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.11.0-39" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "product": { "name": "odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "product_id": "odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.11.0-29" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "product": { "name": "odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "product_id": "odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "product": { "name": "odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "product_id": "odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "product_id": "odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.11.0-24" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "product_id": "odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "product_id": "odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "product": { "name": "odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "product_id": "odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "product_id": "odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.11.0-13" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "product": { "name": "odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "product_id": "odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "product": { "name": "odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "product_id": "odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.11.0-30" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "product": { "name": "odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "product_id": "odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "product": { "name": "odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "product_id": "odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.11.0-28" } } }, { "category": "product_version", "name": "odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "product": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "product_id": "odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel8\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "product_id": "odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.11.0-66" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "product": { "name": "odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "product_id": "odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "product": { "name": "odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "product_id": "odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.11.0-67" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "product": { "name": "odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "product_id": "odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.11.0-51" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.11.0-37" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "product_id": "odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.11.0-39" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "product": { "name": "odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "product_id": "odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.11.0-29" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "product": { "name": "odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "product_id": "odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "product": { "name": "odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "product_id": "odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "product_id": "odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.11.0-24" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "product_id": "odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "product_id": "odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "product": { "name": "odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "product_id": "odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64", "product_id": "odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319?arch=amd64\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.11.0-13" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x" }, "product_reference": "odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64" }, "product_reference": "odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le" }, "product_reference": "odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64" }, "product_reference": "odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x" }, "product_reference": "odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" }, "product_reference": "odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le" }, "product_reference": "odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64" }, "product_reference": "odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x" }, "product_reference": "odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x" }, "product_reference": "odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le" }, "product_reference": "odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64" }, "product_reference": "odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64" }, "product_reference": "odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x" }, "product_reference": "odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le" }, "product_reference": "odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64" }, "product_reference": "odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le" }, "product_reference": "odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" }, "product_reference": "odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64" }, "product_reference": "odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le" }, "product_reference": "odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x" }, "product_reference": "odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le" }, "product_reference": "odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64" }, "product_reference": "odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x" }, "product_reference": "odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64" }, "product_reference": "odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x" }, "product_reference": "odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le" }, "product_reference": "odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x" }, "product_reference": "odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64" }, "product_reference": "odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" }, "product_reference": "odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23440", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-09-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2004944" } ], "notes": [ { "category": "description", "text": "A type confusion vulnerability in nodejs-set-value can lead to a bypass of CVE-2019-10747. If the user-provided keys used in the path parameter are arrays, the function mixin-deep can be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ payloads. This vulnerability can impact data confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-set-value: type confusion allows bypass of CVE-2019-10747", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23440" }, { "category": "external", "summary": "RHBZ#2004944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004944" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23440" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-4jqc-8m5r-9rpr", "url": "https://github.com/advisories/GHSA-4jqc-8m5r-9rpr" } ], "release_date": "2021-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-set-value: type confusion allows bypass of CVE-2019-10747" }, { "cve": "CVE-2021-23566", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2022-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050853" } ], "notes": [ { "category": "description", "text": "A flaw was found in the nanoid library where the valueOf() function allows the reproduction of the last id generated. This flaw allows an attacker to expose sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "nanoid: Information disclosure via valueOf() function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23566" }, { "category": "external", "summary": "RHBZ#2050853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050853" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23566", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23566" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-qrpm-p2h7-hrv2", "url": "https://github.com/advisories/GHSA-qrpm-p2h7-hrv2" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nanoid: Information disclosure via valueOf() function" }, { "cve": "CVE-2022-0235", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2022-01-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044591" } ], "notes": [ { "category": "description", "text": "A flaw was found in node-fetch. When following a redirect to a third-party domain, node-fetch was forwarding sensitive headers such as \"Authorization,\" \"WWW-Authenticate,\" and \"Cookie\" to potentially untrusted targets. This flaw leads to the exposure of sensitive information to an unauthorized actor.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-fetch: exposure of sensitive information to an unauthorized actor", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for dotnet-5.0. For more information about Dotnet product support scope, please see https://access.redhat.com/support/policy/updates/net-core", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0235" }, { "category": "external", "summary": "RHBZ#2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235" }, { "category": "external", "summary": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/", "url": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/" } ], "release_date": "2022-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-fetch: exposure of sensitive information to an unauthorized actor" }, { "cve": "CVE-2022-0536", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2022-02-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053259" } ], "notes": [ { "category": "description", "text": "A flaw was found in the follow-redirects package. This flaw allows the exposure of sensitive information to an unauthorized actor due to the usage of insecure HTTP protocol. This issue happens with an Authorization header leak from the same hostname, https-http, and requires a Man-in-the-Middle (MITM) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Exposure of Sensitive Information via Authorization Header leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0536" }, { "category": "external", "summary": "RHBZ#2053259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0536", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0536" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Exposure of Sensitive Information via Authorization Header leak" }, { "cve": "CVE-2022-1650", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "discovery_date": "2022-05-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2085307" } ], "notes": [ { "category": "description", "text": "A flaw was found in the EventSource NPM Package. The description from the source states the following message: \"Exposure of Sensitive Information to an Unauthorized Actor.\" This flaw allows an attacker to steal the user\u0027s credentials and then use the credentials to access the legitimate website.", "title": "Vulnerability description" }, { "category": "summary", "text": "eventsource: Exposure of Sensitive Information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1650" }, { "category": "external", "summary": "RHBZ#2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1650", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650" }, { "category": "external", "summary": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", "url": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e" } ], "release_date": "2022-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "eventsource: Exposure of Sensitive Information" }, { "cve": "CVE-2022-21698", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045880" } ], "notes": [ { "category": "description", "text": "A denial of service attack was found in prometheus/client_golang. This flaw allows an attacker to produce a denial of service attack on an HTTP server by exploiting the InstrumentHandlerCounter function in the version below 1.11.1, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a moderate impact for two main reasons. The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. Additionally, this is in alignment with upstream\u0027s (the Prometheus project) impact rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21698" }, { "category": "external", "summary": "RHBZ#2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698" }, { "category": "external", "summary": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p", "url": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p" } ], "release_date": "2022-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter" }, { "cve": "CVE-2022-23772", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053532" } ], "notes": [ { "category": "description", "text": "A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issue could allow a remote attacker to impact the availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23772" }, { "category": "external", "summary": "RHBZ#2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString" }, { "cve": "CVE-2022-23773", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053541" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go package of the cmd library in golang. The go command could be tricked into accepting a branch, which resembles a version tag. This issue could allow a remote unauthenticated attacker to bypass security restrictions and introduce invalid or incorrect tags, reducing the integrity of the environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23773" }, { "category": "external", "summary": "RHBZ#2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24771", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067387" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge package. This signature verification leniency allows an attacker to forge a signature.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects the DigestAlgorithm structure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24771" }, { "category": "external", "summary": "RHBZ#2067387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24771", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24771" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery" }, { "cve": "CVE-2022-24772", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067458" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge package. This signature verification leniency allows an attacker to forge a signature.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects the DigestInfo ASN.1 structure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24772" }, { "category": "external", "summary": "RHBZ#2067458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24772" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery" }, { "cve": "CVE-2022-24773", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067461" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge library when verifying the signature on the ASN.1 structure in RSA PKCS#1 v1.5. This flaw allows an attacker to obtain successful verification for invalid DigestInfo structure, affecting the integrity of the attacked resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification leniency in checking `DigestInfo` structure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24773" }, { "category": "external", "summary": "RHBZ#2067461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24773" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-forge: Signature verification leniency in checking `DigestInfo` structure" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" }, { "cve": "CVE-2022-29810", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2022-04-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2080279" } ], "notes": [ { "category": "description", "text": "A flaw was found in go-getter, where the go-getter library can write SSH credentials into its log file. This flaw allows a local user with access to read log files to read sensitive credentials, which may lead to privilege escalation or account takeover.", "title": "Vulnerability description" }, { "category": "summary", "text": "go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29810" }, { "category": "external", "summary": "RHBZ#2080279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080279" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29810", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29810" }, { "category": "external", "summary": "https://github.com/golang/vulndb/issues/438", "url": "https://github.com/golang/vulndb/issues/438" } ], "release_date": "2022-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2023_1044
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.6.2 packages are now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.2 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n* keycloak: XSS on impersonation under specific circumstances (CVE-2022-1438)\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n* keycloak: missing email notification template allowlist (CVE-2022-1274)\n* keycloak: minimist: prototype pollution (CVE-2021-44906)\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n* undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations (CVE-2022-2764)\n* snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)\n* loader-utils: loader-utils:Regular expression denial of service (CVE-2022-37603)\n* keycloak: Session takeover with OIDC offline refreshtokens (CVE-2022-3916)\n* keycloak: path traversal via double URL encoding (CVE-2022-3782)\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode (CVE-2022-38749)\n* snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match (CVE-2022-38751)\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject (CVE-2022-38750)\n* keycloak: Client Registration endpoint does not check token revocation (CVE-2023-0091)\n* keycloak: glob-parent: Regular Expression Denial of Service (CVE-2021-35065)\n* json5: Prototype Pollution in JSON5 via Parse Method (CVE-2022-46175)\n* keycloak: keycloak: user impersonation via stolen uuid code (CVE-2023-0264)\n* snakeyaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n* CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)\n* rcue-bootstrap: bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)\n* jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)\n* sshd-common: mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)\n* jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)\n* jettison: parser crash by stackoverflow (CVE-2022-40149)\n* jackson-databind: use of deeply nested arrays (CVE-2022-42004)\n* jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)\n* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)\n* jquery: Passing HTML containing \u003coption\u003e elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)\n* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)\n* jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)\n* CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363)\n* keycloak: reflected XSS attack (CVE-2022-4137)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1044", "url": "https://access.redhat.com/errata/RHSA-2023:1044" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1601614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601614" }, { "category": "external", "summary": "1601617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601617" }, { "category": "external", "summary": "1701972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" }, { "category": "external", "summary": "1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "2031904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031904" }, { "category": "external", "summary": "2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2073157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" }, { "category": "external", "summary": "2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "2129707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129707" }, { "category": "external", "summary": "2129709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129709" }, { "category": "external", "summary": "2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "2135770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135770" }, { "category": "external", "summary": "2135771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771" }, { "category": "external", "summary": "2138971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971" }, { "category": "external", "summary": "2140597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140597" }, { "category": "external", "summary": "2141404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141404" }, { "category": "external", "summary": "2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "2148496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148496" }, { "category": "external", "summary": "2150009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009" }, { "category": "external", "summary": "2155681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155681" }, { "category": "external", "summary": "2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "2155970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155970" }, { "category": "external", "summary": "2156263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263" }, { "category": "external", "summary": "2156324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324" }, { "category": "external", "summary": "2158585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158585" }, { "category": "external", "summary": "2160585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160585" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1044.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 8", "tracking": { "current_release_date": "2024-12-18T00:38:15+00:00", "generator": { "date": "2024-12-18T00:38:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:1044", "initial_release_date": "2023-03-01T21:45:12+00:00", "revision_history": [ { "date": "2023-03-01T21:45:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-03-01T21:45:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:38:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.6 for RHEL 8", "product": { "name": "Red Hat Single Sign-On 7.6 for RHEL 8", "product_id": "8Base-RHSSO-7.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "product": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "product_id": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.6-1.redhat_00001.1.el8sso?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.6-1.redhat_00001.1.el8sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.6-1.redhat_00001.1.el8sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 8", "product_id": "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 8", "product_id": "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src" }, "product_reference": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "relates_to_product_reference": "8Base-RHSSO-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 8", "product_id": "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14040", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601614" } ], "notes": [ { "category": "description", "text": "In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6.2 and newer versions don\u0027t use the bootstrap library, hence are not affected by this flaw.\n\nRed Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.\n\nRed Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14040" }, { "category": "external", "summary": "RHBZ#1601614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601614" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14040" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute" }, { "cve": "CVE-2018-14042", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601617" } ], "notes": [ { "category": "description", "text": "In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6.2 and newer versions don\u0027t use the bootstrap library, hence are not affected by this flaw.\n\nRed Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.\n\nRed Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14042" }, { "category": "external", "summary": "RHBZ#1601617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601617" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14042", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14042" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14042", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14042" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip" }, { "cve": "CVE-2019-11358", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1701972" } ], "notes": [ { "category": "description", "text": "A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modifying objects up the prototype chain, including the global Object. A crafted JSON object passed to a vulnerable method could lead to denial of service or data injection, with various consequences.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Virtualization 4.2 EUS contains the affected version of bootstrap in the packages ovirt-js-dependencies and ovirt-engine-dashboard. These packages are deprecated in Red Hat Virtualization 4.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11358" }, { "category": "external", "summary": "RHBZ#1701972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11358", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358" }, { "category": "external", "summary": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/", "url": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/" }, { "category": "external", "summary": "https://www.drupal.org/sa-core-2019-006", "url": "https://www.drupal.org/sa-core-2019-006" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection" }, { "cve": "CVE-2020-11022", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828406" } ], "notes": [ { "category": "description", "text": "A Cross-site scripting (XSS) vulnerability exists in JQuery. This flaw allows an attacker with the ability to supply input to the \u2018HTML\u2019 function to inject Javascript into the page where that input is rendered, and have it delivered by the browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method", "title": "Vulnerability summary" }, { "category": "other", "text": "No supported release of Red Hat OpenStack Platform is affected by this vulnerability as no shipped packages contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11022" }, { "category": "external", "summary": "RHBZ#1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11022", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2" } ], "release_date": "2020-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method" }, { "cve": "CVE-2020-11023", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1850004" } ], "notes": [ { "category": "description", "text": "A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery\u0027s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux versions 6, 7, and 8 ship a vulnerable version of JQuery in the `pcs` component. However, the vulnerability has not been found to be exploitable in reasonable scenarios. \n\nIn RHEL7, pcs-0.9.169-3.el7_9.3 [RHSA-2022:7343] contains an updated version of jquery (3.6.0), which does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11023" }, { "category": "external", "summary": "RHBZ#1850004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023" }, { "category": "external", "summary": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/", "url": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" } ], "release_date": "2020-04-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods" }, { "cve": "CVE-2021-35065", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156324" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "glob-parent: Regular Expression Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The glob-parent package is a transitive dependency and this is not used directly in any of the Red Hat products. Hence, the impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-35065" }, { "category": "external", "summary": "RHBZ#2156324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-35065", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294", "url": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294" } ], "release_date": "2022-12-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glob-parent: Regular Expression Denial of Service" }, { "cve": "CVE-2021-44906", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2066009" } ], "notes": [ { "category": "description", "text": "An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker to trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "minimist: prototype pollution", "title": "Vulnerability summary" }, { "category": "other", "text": "The original fix for CVE-2020-7598 was incomplete as it was still possible to bypass in some cases. While this flaw (CVE-2021-44906) enables attackers to control objects that they should not have access to, actual exploitation would still require a chain of independent flaws. Even though the CVSS for CVE-2021-44906 is higher than CVE-2020-7598, they are both rated as having Moderate impact.\n\nWithin Red Hat Satellite 6 this flaw has been rated as having a security impact of Low. It is not currently planned to be addressed there, as the minimist library is only included in the -doc subpackage and is part of test fixtures that are not in the execution path used by the rabl gem.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44906" }, { "category": "external", "summary": "RHBZ#2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-xvch-5gv4-984h", "url": "https://github.com/advisories/GHSA-xvch-5gv4-984h" } ], "release_date": "2022-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "minimist: prototype pollution" }, { "acknowledgments": [ { "names": [ "Marcus Nilsson" ], "organization": "usd AG" } ], "cve": "CVE-2022-1274", "cwe": { "id": "CWE-80", "name": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)" }, "discovery_date": "2022-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073157" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: HTML injection in execute-actions-email Admin REST API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1274" }, { "category": "external", "summary": "RHBZ#2073157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1274", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725" } ], "release_date": "2023-02-28T18:57:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: HTML injection in execute-actions-email Admin REST API" }, { "acknowledgments": [ { "names": [ "Grzegorz Tworek" ], "organization": "SISOFT s.c." } ], "cve": "CVE-2022-1438", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031904" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. Under specific circumstances, HTML entities are not sanitized during user impersonation, resulting in a Cross-site scripting (XSS) vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: XSS on impersonation under specific circumstances", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1438" }, { "category": "external", "summary": "RHBZ#2031904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1438", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1438" } ], "release_date": "2023-02-28T18:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: XSS on impersonation under specific circumstances" }, { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2150009" } ], "notes": [ { "category": "description", "text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).", "title": "Vulnerability description" }, { "category": "summary", "text": "SnakeYaml: Constructor Deserialization Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1471" }, { "category": "external", "summary": "RHBZ#2150009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2", "url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2" } ], "release_date": "2022-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "SnakeYaml: Constructor Deserialization Remote Code Execution" }, { "cve": "CVE-2022-2764", "discovery_date": "2022-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2117506" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow with EJB invocations. This flaw allows an attacker to generate a valid HTTP request and send it to the server on an established connection after removing the LAST_CHUNK from the bytes, causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2764" }, { "category": "external", "summary": "RHBZ#2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2764" } ], "release_date": "2022-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations" }, { "acknowledgments": [ { "names": [ "Peter Flintholm" ], "organization": "Trifork" } ], "cve": "CVE-2022-3916", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2022-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141404" } ], "notes": [ { "category": "description", "text": "A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: Session takeover with OIDC offline refreshtokens", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3916" }, { "category": "external", "summary": "RHBZ#2141404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3916" } ], "release_date": "2022-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: Session takeover with OIDC offline refreshtokens" }, { "cve": "CVE-2022-4137", "cwe": { "id": "CWE-81", "name": "Improper Neutralization of Script in an Error Message Web Page" }, "discovery_date": "2022-11-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2148496" } ], "notes": [ { "category": "description", "text": "A reflected cross-site scripting (XSS) vulnerability was found in the \u0027oob\u0027 OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: reflected XSS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4137" }, { "category": "external", "summary": "RHBZ#2148496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4137", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137" } ], "release_date": "2023-03-01T13:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: reflected XSS attack" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-25857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126789" } ], "notes": [ { "category": "description", "text": "A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Denial of Service due to missing nested depth limitation for collections", "title": "Vulnerability summary" }, { "category": "other", "text": "For RHEL-8 it\u0027s downgraded to moderate because \"snakeyaml\" itself in RHEL 8 or RHEL-9 isn\u0027t shipped and \"prometheus-jmx-exporter\" is needed as build dependency. And it\u0027s not directly exploitable, hence severity marked as moderate.\nRed Hat Integration and AMQ products are not vulnerable to this flaw, so their severity has been lowered to moderate.\nRed Hat Single Sign-On uses snakeyaml from liquibase-core and is only used when performing migrations and would require administrator privileges to execute, hence severity marked as Low.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be present soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25857" }, { "category": "external", "summary": "RHBZ#2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25857", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857" }, { "category": "external", "summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525" } ], "release_date": "2022-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "snakeyaml: Denial of Service due to missing nested depth limitation for collections" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-37603", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140597" } ], "notes": [ { "category": "description", "text": "A flaw was found in loader-utils webpack library. When the url variable from interpolateName is set, the prototype can be polluted. This issue could lead to a regular expression Denial of Service (ReDoS), affecting the availability of the affected component.", "title": "Vulnerability description" }, { "category": "summary", "text": "loader-utils: Regular expression denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-37603" }, { "category": "external", "summary": "RHBZ#2140597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140597" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-37603", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-37603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37603" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "loader-utils: Regular expression denial of service" }, { "cve": "CVE-2022-38749", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129706" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38749" }, { "category": "external", "summary": "RHBZ#2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38749", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode" }, { "cve": "CVE-2022-38750", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129707" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38750" }, { "category": "external", "summary": "RHBZ#2129707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129707" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38750", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38750" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject" }, { "cve": "CVE-2022-38751", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129709" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38751" }, { "category": "external", "summary": "RHBZ#2129709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38751", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38751" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38751", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38751" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match" }, { "cve": "CVE-2022-40149", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135771" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. This flaw allows an attacker to supply content that causes the parser to crash by writing outside the memory bounds if the parser is running on user-supplied input, resulting in a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: parser crash by stackoverflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40149" }, { "category": "external", "summary": "RHBZ#2135771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149" }, { "category": "external", "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1", "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: parser crash by stackoverflow" }, { "cve": "CVE-2022-40150", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135770" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. If the parser is running on user-supplied input, an attacker may supply content that causes the parser to crash, causing memory exhaustion. This effect may support a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: memory exhaustion via user-supplied XML or JSON data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40150" }, { "category": "external", "summary": "RHBZ#2135770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40150", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40150" }, { "category": "external", "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1", "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jettison: memory exhaustion via user-supplied XML or JSON data" }, { "cve": "CVE-2022-42003", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135244" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled due to unchecked primitive value deserializers to avoid deep wrapper array nesting.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42003" }, { "category": "external", "summary": "RHBZ#2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS" }, { "cve": "CVE-2022-42004", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135247" } ], "notes": [ { "category": "description", "text": "A flaw was found In FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion due to the lack of a check in BeanDeserializer._deserializeFromArray to prevent the use of deeply nested arrays. An application is only vulnerable with certain customized choices for deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: use of deeply nested arrays", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42004" }, { "category": "external", "summary": "RHBZ#2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42004", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: use of deeply nested arrays" }, { "cve": "CVE-2022-45047", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2145194" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache MINA SSHD, when using Java deserialization to load a serialized java.security.PrivateKey. An attacker could benefit from unsafe deserialization by inserting unsecured data that may affect the application or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "mina-sshd: Java unsafe deserialization vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Impact as High as there\u0027s a mitigation for minimizing the impact which the flaw requires org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to be impacted, which would require an external/public API for an attacker to benefit from it. \n\nRed Hat Fuse 7 and Red Hat JBoss Enterprise Application Platform 7 have a lower rate (moderate) as it\u0027s very unlikely to be exploited since those are for internal usage or use a custom implementation in their case.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45047" }, { "category": "external", "summary": "RHBZ#2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45047", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047" }, { "category": "external", "summary": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html", "url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html" } ], "release_date": "2022-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" }, { "category": "workaround", "details": "From the maintainer:\n\nFor Apache MINA SSHD \u003c= 2.9.1, do not use org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to generate and later load your server\u0027s host key. Use separately generated host key files, for instance in OpenSSH format, and load them via a org.apache.sshd.common.keyprovider.FileKeyPairProvider instead. Or use a custom implementation instead of \nSimpleGeneratorHostKeyProvider that uses the OpenSSH format for storing and loading the host key (via classes OpenSSHKeyPairResourceWriter and OpenSSHKeyPairResourceParser).", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mina-sshd: Java unsafe deserialization vulnerability" }, { "cve": "CVE-2022-45693", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155970" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jettison, where it is vulnerable to a denial of service caused by a stack-based buffer overflow. By sending a specially-crafted request using the map parameter, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has determined the impact of this flaw to be Moderate; a successful attack using this flaw would require the processing of untrusted, unsanitized, or unrestricted user inputs, which runs counter to established Red Hat security practices.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45693" }, { "category": "external", "summary": "RHBZ#2155970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45693" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos" }, { "cve": "CVE-2022-46175", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156263" } ], "notes": [ { "category": "description", "text": "A flaw was found in the json5 package. The affected version of the json5 package could allow an attacker to set arbitrary and unexpected keys on the object returned from JSON5.parse.", "title": "Vulnerability description" }, { "category": "summary", "text": "json5: Prototype Pollution in JSON5 via Parse Method", "title": "Vulnerability summary" }, { "category": "other", "text": "The json5 package is a build-time dependency in Red Hat products and is not used in production runtime. Hence, the impact is set to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46175" }, { "category": "external", "summary": "RHBZ#2156263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175" }, { "category": "external", "summary": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h", "url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h" } ], "release_date": "2022-12-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "json5: Prototype Pollution in JSON5 via Parse Method" }, { "cve": "CVE-2022-46363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155681" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache CXF that could allow an attacker to perform a remote directory listing or code exfiltration. This issue only applies when the CXFServlet is configured with both the static-resources-list and redirect-query-check attributes. These attributes are not supposed to be used together, so the issue can only occur if the CXF service is misconfigured.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: directory listing / code exfiltration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46363" }, { "category": "external", "summary": "RHBZ#2155681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46363", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46363" }, { "category": "external", "summary": "https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c", "url": "https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "CXF: directory listing / code exfiltration" }, { "cve": "CVE-2022-46364", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155682" } ], "notes": [ { "category": "description", "text": "A SSRF vulnerability was found in Apache CXF. This issue occurs when parsing the href attribute of XOP:Include in MTOM requests, allowing an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSRF Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Integration Camel Quarkus does not support CXF extensions and so is affected at a reduced impact of Moderate.\nThe RHSSO server does not ship Apache CXF. The component mentioned in CVE-2022-46364 is a transitive dependency coming from Fuse adapters and the test suite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46364" }, { "category": "external", "summary": "RHBZ#2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2", "url": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "CXF: SSRF Vulnerability" }, { "acknowledgments": [ { "names": [ "Sourav Kumar" ], "organization": "https://github.com/souravs17031999", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2023-0091", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-10-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2158585" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: Client Registration endpoint does not check token revocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0091" }, { "category": "external", "summary": "RHBZ#2158585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0091", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0091" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg" }, { "category": "external", "summary": "https://github.com/keycloak/security/issues/27", "url": "https://github.com/keycloak/security/issues/27" } ], "release_date": "2022-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: Client Registration endpoint does not check token revocation" }, { "acknowledgments": [ { "names": [ "Jordi Zayuelas i Mu\u00f1oz" ], "organization": "A1 Digital", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2023-0264", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "discovery_date": "2023-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2160585" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak\u0027s OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, Integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: user impersonation via stolen uuid code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0264" }, { "category": "external", "summary": "RHBZ#2160585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0264" } ], "release_date": "2023-02-28T18:58:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:45:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1044" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: user impersonation via stolen uuid code" } ] }
rhsa-2023_1047
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A new image is available for Red Hat Single Sign-On 7.6.2, running on Red\nHat OpenShift Container Platform from the release of 3.11 up to the release\nof 4.12.0.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On is an integrated sign-on solution, available as a\nRed Hat JBoss Middleware for OpenShift containerized image. The Red Hat\nSingle Sign-On for OpenShift image provides an authentication server that\nyou can use to log in centrally, log out, and register. You can also manage\nuser accounts for web applications, mobile applications, and RESTful web\nservices.\n\n* snakeyaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n* keycloak: path traversal via double URL encoding (CVE-2022-3782)\n* RH-SSO for OpenShift images: unsecured management interface exposed to adjacent network (CVE-2022-4039)\n* snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n* sshd-common: mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)\n* CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)\n* keycloak: keycloak: user impersonation via stolen uuid code (CVE-2023-0264)\n* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)\n* rcue-bootstrap: bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)\n* jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)\n* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)\n* keycloak: glob-parent: Regular Expression Denial of Service (CVE-2021-35065)\n* keycloak: minimist: prototype pollution (CVE-2021-44906)\n* keycloak: missing email notification template allowlist (CVE-2022-1274)\n* keycloak: XSS on izmpersonation under specific circumstances (CVE-2022-1438)\n* keycloak: Session takeover with OIDC offline refreshtokens (CVE-2022-3916)\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n* loader-utils: loader-utils:Regular expression denial of service (CVE-2022-37603)\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode (CVE-2022-38749)\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject (CVE-2022-38750)\n* snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match (CVE-2022-38751)\n* jettison: parser crash by stackoverflow (CVE-2022-40149)\n* jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)\n* jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)\n* json5: Prototype Pollution in JSON5 via Parse Method (CVE-2022-46175)\n* jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)\n* jackson-databind: use of deeply nested arrays (CVE-2022-42004)\n* CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363)\n* undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations (CVE-2022-2764)\n* keycloak: Client Registration endpoint does not check token revocation (CVE-2023-0091)\n\nThis erratum releases a new image for Red Hat Single Sign-On 7.6.2 for use\nwithin the Red Hat OpenShift Container Platform (from the release of 3.11\nup to the release of 4.12.0) cloud computing Platform-as-a-Service (PaaS)\nfor on-premise or private cloud deployments, aligning with the standalone\nproduct release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1047", "url": "https://access.redhat.com/errata/RHSA-2023:1047" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1601614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601614" }, { "category": "external", "summary": "1601617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601617" }, { "category": "external", "summary": "1701972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" }, { "category": "external", "summary": "1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "2031904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031904" }, { "category": "external", "summary": "2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2073157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" }, { "category": "external", "summary": "2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "2129707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129707" }, { "category": "external", "summary": "2129709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129709" }, { "category": "external", "summary": "2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "2135770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135770" }, { "category": "external", "summary": "2135771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771" }, { "category": "external", "summary": "2138971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971" }, { "category": "external", "summary": "2140597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140597" }, { "category": "external", "summary": "2141404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141404" }, { "category": "external", "summary": "2143416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143416" }, { "category": "external", "summary": "2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "2150009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009" }, { "category": "external", "summary": "2155681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155681" }, { "category": "external", "summary": "2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "2155970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155970" }, { "category": "external", "summary": "2156263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263" }, { "category": "external", "summary": "2156324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324" }, { "category": "external", "summary": "2158585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158585" }, { "category": "external", "summary": "2160585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160585" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1047.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 for OpenShift image security and enhancement update", "tracking": { "current_release_date": "2024-12-18T00:38:34+00:00", "generator": { "date": "2024-12-18T00:38:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:1047", "initial_release_date": "2023-03-01T21:46:46+00:00", "revision_history": [ { "date": "2023-03-01T21:46:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-03-01T21:46:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:38:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Middleware Containers for OpenShift", "product": { "name": "Middleware Containers for OpenShift", "product_id": "8Base-RHOSE-Middleware", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhosemc:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x", "product": { "name": "rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x", "product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x", "product_identification_helper": { "purl": "pkg:oci/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21?arch=s390x\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-20" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "product": { "name": "rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "product_identification_helper": { "purl": "pkg:oci/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60?arch=ppc64le\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-20" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "product": { "name": "rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "product_identification_helper": { "purl": "pkg:oci/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f?arch=amd64\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-20" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le as a component of Middleware Containers for OpenShift", "product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le" }, "product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "relates_to_product_reference": "8Base-RHOSE-Middleware" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64 as a component of Middleware Containers for OpenShift", "product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64" }, "product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "relates_to_product_reference": "8Base-RHOSE-Middleware" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x as a component of Middleware Containers for OpenShift", "product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" }, "product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x", "relates_to_product_reference": "8Base-RHOSE-Middleware" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14040", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601614" } ], "notes": [ { "category": "description", "text": "In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6.2 and newer versions don\u0027t use the bootstrap library, hence are not affected by this flaw.\n\nRed Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.\n\nRed Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14040" }, { "category": "external", "summary": "RHBZ#1601614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601614" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14040" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute" }, { "cve": "CVE-2018-14042", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601617" } ], "notes": [ { "category": "description", "text": "In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6.2 and newer versions don\u0027t use the bootstrap library, hence are not affected by this flaw.\n\nRed Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.\n\nRed Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14042" }, { "category": "external", "summary": "RHBZ#1601617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601617" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14042", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14042" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14042", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14042" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip" }, { "cve": "CVE-2019-11358", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1701972" } ], "notes": [ { "category": "description", "text": "A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modifying objects up the prototype chain, including the global Object. A crafted JSON object passed to a vulnerable method could lead to denial of service or data injection, with various consequences.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Virtualization 4.2 EUS contains the affected version of bootstrap in the packages ovirt-js-dependencies and ovirt-engine-dashboard. These packages are deprecated in Red Hat Virtualization 4.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11358" }, { "category": "external", "summary": "RHBZ#1701972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11358", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358" }, { "category": "external", "summary": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/", "url": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/" }, { "category": "external", "summary": "https://www.drupal.org/sa-core-2019-006", "url": "https://www.drupal.org/sa-core-2019-006" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection" }, { "cve": "CVE-2020-11022", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828406" } ], "notes": [ { "category": "description", "text": "A Cross-site scripting (XSS) vulnerability exists in JQuery. This flaw allows an attacker with the ability to supply input to the \u2018HTML\u2019 function to inject Javascript into the page where that input is rendered, and have it delivered by the browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method", "title": "Vulnerability summary" }, { "category": "other", "text": "No supported release of Red Hat OpenStack Platform is affected by this vulnerability as no shipped packages contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11022" }, { "category": "external", "summary": "RHBZ#1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11022", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2" } ], "release_date": "2020-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method" }, { "cve": "CVE-2021-35065", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156324" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "glob-parent: Regular Expression Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The glob-parent package is a transitive dependency and this is not used directly in any of the Red Hat products. Hence, the impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-35065" }, { "category": "external", "summary": "RHBZ#2156324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-35065", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294", "url": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294" } ], "release_date": "2022-12-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "glob-parent: Regular Expression Denial of Service" }, { "cve": "CVE-2021-44906", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2066009" } ], "notes": [ { "category": "description", "text": "An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker to trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "minimist: prototype pollution", "title": "Vulnerability summary" }, { "category": "other", "text": "The original fix for CVE-2020-7598 was incomplete as it was still possible to bypass in some cases. While this flaw (CVE-2021-44906) enables attackers to control objects that they should not have access to, actual exploitation would still require a chain of independent flaws. Even though the CVSS for CVE-2021-44906 is higher than CVE-2020-7598, they are both rated as having Moderate impact.\n\nWithin Red Hat Satellite 6 this flaw has been rated as having a security impact of Low. It is not currently planned to be addressed there, as the minimist library is only included in the -doc subpackage and is part of test fixtures that are not in the execution path used by the rabl gem.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44906" }, { "category": "external", "summary": "RHBZ#2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-xvch-5gv4-984h", "url": "https://github.com/advisories/GHSA-xvch-5gv4-984h" } ], "release_date": "2022-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "minimist: prototype pollution" }, { "acknowledgments": [ { "names": [ "Marcus Nilsson" ], "organization": "usd AG" } ], "cve": "CVE-2022-1274", "cwe": { "id": "CWE-80", "name": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)" }, "discovery_date": "2022-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073157" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: HTML injection in execute-actions-email Admin REST API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1274" }, { "category": "external", "summary": "RHBZ#2073157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1274", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725" } ], "release_date": "2023-02-28T18:57:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: HTML injection in execute-actions-email Admin REST API" }, { "acknowledgments": [ { "names": [ "Grzegorz Tworek" ], "organization": "SISOFT s.c." } ], "cve": "CVE-2022-1438", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031904" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. Under specific circumstances, HTML entities are not sanitized during user impersonation, resulting in a Cross-site scripting (XSS) vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: XSS on impersonation under specific circumstances", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1438" }, { "category": "external", "summary": "RHBZ#2031904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1438", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1438" } ], "release_date": "2023-02-28T18:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: XSS on impersonation under specific circumstances" }, { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2150009" } ], "notes": [ { "category": "description", "text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).", "title": "Vulnerability description" }, { "category": "summary", "text": "SnakeYaml: Constructor Deserialization Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1471" }, { "category": "external", "summary": "RHBZ#2150009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2", "url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2" } ], "release_date": "2022-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "SnakeYaml: Constructor Deserialization Remote Code Execution" }, { "cve": "CVE-2022-2764", "discovery_date": "2022-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2117506" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow with EJB invocations. This flaw allows an attacker to generate a valid HTTP request and send it to the server on an established connection after removing the LAST_CHUNK from the bytes, causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2764" }, { "category": "external", "summary": "RHBZ#2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2764" } ], "release_date": "2022-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations" }, { "cve": "CVE-2022-3782", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2138971" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: path traversal via double URL encoding", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not impacted as this CVE affects the server-side Keycloak execution but Quarkus only acts as a Keycloak client in its quarkus-keycloak-authorization extension. For this reason Quarkus is marked with Low impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3782" }, { "category": "external", "summary": "RHBZ#2138971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3782", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782" } ], "release_date": "2022-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: path traversal via double URL encoding" }, { "acknowledgments": [ { "names": [ "Peter Flintholm" ], "organization": "Trifork" } ], "cve": "CVE-2022-3916", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2022-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141404" } ], "notes": [ { "category": "description", "text": "A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: Session takeover with OIDC offline refreshtokens", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3916" }, { "category": "external", "summary": "RHBZ#2141404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3916" } ], "release_date": "2022-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: Session takeover with OIDC offline refreshtokens" }, { "acknowledgments": [ { "names": [ "Thibault Guittet" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2022-4039", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "discovery_date": "2022-11-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2143416" } ], "notes": [ { "category": "description", "text": "A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "rhsso-container-image: unsecured management interface exposed to adjecent network", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4039" }, { "category": "external", "summary": "RHBZ#2143416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143416" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4039", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4039" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4039", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4039" } ], "release_date": "2023-02-28T21:26:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "rhsso-container-image: unsecured management interface exposed to adjecent network" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-25857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126789" } ], "notes": [ { "category": "description", "text": "A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Denial of Service due to missing nested depth limitation for collections", "title": "Vulnerability summary" }, { "category": "other", "text": "For RHEL-8 it\u0027s downgraded to moderate because \"snakeyaml\" itself in RHEL 8 or RHEL-9 isn\u0027t shipped and \"prometheus-jmx-exporter\" is needed as build dependency. And it\u0027s not directly exploitable, hence severity marked as moderate.\nRed Hat Integration and AMQ products are not vulnerable to this flaw, so their severity has been lowered to moderate.\nRed Hat Single Sign-On uses snakeyaml from liquibase-core and is only used when performing migrations and would require administrator privileges to execute, hence severity marked as Low.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be present soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25857" }, { "category": "external", "summary": "RHBZ#2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25857", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857" }, { "category": "external", "summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525" } ], "release_date": "2022-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "snakeyaml: Denial of Service due to missing nested depth limitation for collections" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-37603", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140597" } ], "notes": [ { "category": "description", "text": "A flaw was found in loader-utils webpack library. When the url variable from interpolateName is set, the prototype can be polluted. This issue could lead to a regular expression Denial of Service (ReDoS), affecting the availability of the affected component.", "title": "Vulnerability description" }, { "category": "summary", "text": "loader-utils: Regular expression denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-37603" }, { "category": "external", "summary": "RHBZ#2140597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140597" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-37603", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-37603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37603" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "loader-utils: Regular expression denial of service" }, { "cve": "CVE-2022-38749", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129706" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38749" }, { "category": "external", "summary": "RHBZ#2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38749", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode" }, { "cve": "CVE-2022-38750", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129707" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38750" }, { "category": "external", "summary": "RHBZ#2129707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129707" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38750", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38750" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject" }, { "cve": "CVE-2022-38751", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129709" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38751" }, { "category": "external", "summary": "RHBZ#2129709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38751", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38751" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38751", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38751" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match" }, { "cve": "CVE-2022-40149", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135771" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. This flaw allows an attacker to supply content that causes the parser to crash by writing outside the memory bounds if the parser is running on user-supplied input, resulting in a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: parser crash by stackoverflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40149" }, { "category": "external", "summary": "RHBZ#2135771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149" }, { "category": "external", "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1", "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: parser crash by stackoverflow" }, { "cve": "CVE-2022-40150", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135770" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. If the parser is running on user-supplied input, an attacker may supply content that causes the parser to crash, causing memory exhaustion. This effect may support a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: memory exhaustion via user-supplied XML or JSON data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40150" }, { "category": "external", "summary": "RHBZ#2135770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40150", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40150" }, { "category": "external", "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1", "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jettison: memory exhaustion via user-supplied XML or JSON data" }, { "cve": "CVE-2022-42003", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135244" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled due to unchecked primitive value deserializers to avoid deep wrapper array nesting.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42003" }, { "category": "external", "summary": "RHBZ#2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS" }, { "cve": "CVE-2022-42004", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135247" } ], "notes": [ { "category": "description", "text": "A flaw was found In FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion due to the lack of a check in BeanDeserializer._deserializeFromArray to prevent the use of deeply nested arrays. An application is only vulnerable with certain customized choices for deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: use of deeply nested arrays", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42004" }, { "category": "external", "summary": "RHBZ#2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42004", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: use of deeply nested arrays" }, { "cve": "CVE-2022-45047", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2145194" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache MINA SSHD, when using Java deserialization to load a serialized java.security.PrivateKey. An attacker could benefit from unsafe deserialization by inserting unsecured data that may affect the application or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "mina-sshd: Java unsafe deserialization vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Impact as High as there\u0027s a mitigation for minimizing the impact which the flaw requires org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to be impacted, which would require an external/public API for an attacker to benefit from it. \n\nRed Hat Fuse 7 and Red Hat JBoss Enterprise Application Platform 7 have a lower rate (moderate) as it\u0027s very unlikely to be exploited since those are for internal usage or use a custom implementation in their case.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45047" }, { "category": "external", "summary": "RHBZ#2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45047", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047" }, { "category": "external", "summary": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html", "url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html" } ], "release_date": "2022-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" }, { "category": "workaround", "details": "From the maintainer:\n\nFor Apache MINA SSHD \u003c= 2.9.1, do not use org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to generate and later load your server\u0027s host key. Use separately generated host key files, for instance in OpenSSH format, and load them via a org.apache.sshd.common.keyprovider.FileKeyPairProvider instead. Or use a custom implementation instead of \nSimpleGeneratorHostKeyProvider that uses the OpenSSH format for storing and loading the host key (via classes OpenSSHKeyPairResourceWriter and OpenSSHKeyPairResourceParser).", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mina-sshd: Java unsafe deserialization vulnerability" }, { "cve": "CVE-2022-45693", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155970" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jettison, where it is vulnerable to a denial of service caused by a stack-based buffer overflow. By sending a specially-crafted request using the map parameter, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has determined the impact of this flaw to be Moderate; a successful attack using this flaw would require the processing of untrusted, unsanitized, or unrestricted user inputs, which runs counter to established Red Hat security practices.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45693" }, { "category": "external", "summary": "RHBZ#2155970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45693" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos" }, { "cve": "CVE-2022-46175", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156263" } ], "notes": [ { "category": "description", "text": "A flaw was found in the json5 package. The affected version of the json5 package could allow an attacker to set arbitrary and unexpected keys on the object returned from JSON5.parse.", "title": "Vulnerability description" }, { "category": "summary", "text": "json5: Prototype Pollution in JSON5 via Parse Method", "title": "Vulnerability summary" }, { "category": "other", "text": "The json5 package is a build-time dependency in Red Hat products and is not used in production runtime. Hence, the impact is set to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46175" }, { "category": "external", "summary": "RHBZ#2156263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175" }, { "category": "external", "summary": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h", "url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h" } ], "release_date": "2022-12-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "json5: Prototype Pollution in JSON5 via Parse Method" }, { "cve": "CVE-2022-46363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155681" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache CXF that could allow an attacker to perform a remote directory listing or code exfiltration. This issue only applies when the CXFServlet is configured with both the static-resources-list and redirect-query-check attributes. These attributes are not supposed to be used together, so the issue can only occur if the CXF service is misconfigured.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: directory listing / code exfiltration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46363" }, { "category": "external", "summary": "RHBZ#2155681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46363", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46363" }, { "category": "external", "summary": "https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c", "url": "https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "CXF: directory listing / code exfiltration" }, { "cve": "CVE-2022-46364", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155682" } ], "notes": [ { "category": "description", "text": "A SSRF vulnerability was found in Apache CXF. This issue occurs when parsing the href attribute of XOP:Include in MTOM requests, allowing an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSRF Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Integration Camel Quarkus does not support CXF extensions and so is affected at a reduced impact of Moderate.\nThe RHSSO server does not ship Apache CXF. The component mentioned in CVE-2022-46364 is a transitive dependency coming from Fuse adapters and the test suite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46364" }, { "category": "external", "summary": "RHBZ#2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2", "url": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "CXF: SSRF Vulnerability" }, { "acknowledgments": [ { "names": [ "Sourav Kumar" ], "organization": "https://github.com/souravs17031999", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2023-0091", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-10-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2158585" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: Client Registration endpoint does not check token revocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0091" }, { "category": "external", "summary": "RHBZ#2158585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0091", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0091" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg" }, { "category": "external", "summary": "https://github.com/keycloak/security/issues/27", "url": "https://github.com/keycloak/security/issues/27" } ], "release_date": "2022-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: Client Registration endpoint does not check token revocation" }, { "acknowledgments": [ { "names": [ "Jordi Zayuelas i Mu\u00f1oz" ], "organization": "A1 Digital", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2023-0264", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "discovery_date": "2023-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2160585" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak\u0027s OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, Integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: user impersonation via stolen uuid code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0264" }, { "category": "external", "summary": "RHBZ#2160585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0264" } ], "release_date": "2023-02-28T18:58:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:46:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1047" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:10450cf7e28d9b1628e95867562763019181a9a980e6e465fe69faf056a1cb60_ppc64le", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:19520720c6ff7acbfb4c8b1bc0d9353c2205bb640405f1d08f70ee14061f190f_amd64", "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:77e19865fa9031305daa8c9872eb273c6442748a9cd3d6628309721fbf781c21_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: user impersonation via stolen uuid code" } ] }
rhsa-2023_1486
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Gluster Storage 3.5 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nDjango is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don\u0027t Repeat Yourself) principle.\n\nRuby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n* puma-5.6.4: http request smuggling vulnerabilities (CVE-2022-24790)\n\n* rubygem-rack: crafted requests can cause shell escape sequences (CVE-2022-30123)\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* rubygem-tzinfo: arbitrary code execution (CVE-2022-31163)\n\n* rubygem-rack: crafted multipart POST request may cause a DoS (CVE-2022-30122)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1486", "url": "https://access.redhat.com/errata/RHSA-2023:1486" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2071616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071616" }, { "category": "external", "summary": "2099519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099519" }, { "category": "external", "summary": "2099524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099524" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2110551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110551" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1486.json" } ], "title": "Red Hat Security Advisory: Red Hat Gluster Storage web-admin-build security update", "tracking": { "current_release_date": "2024-12-18T00:38:44+00:00", "generator": { "date": "2024-12-18T00:38:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:1486", "initial_release_date": "2023-03-28T00:18:32+00:00", "revision_history": [ { "date": "2023-03-28T00:18:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-03-28T00:18:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:38:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster 3.5 Web Administration on RHEL-7", "product": { "name": "Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.5:wa:el7" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "grafana-0:5.2.4-6.el7rhgs.src", "product": { "name": "grafana-0:5.2.4-6.el7rhgs.src", "product_id": "grafana-0:5.2.4-6.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana@5.2.4-6.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "python-django-0:1.11.27-4.el7rhgs.src", "product": { "name": "python-django-0:1.11.27-4.el7rhgs.src", "product_id": "python-django-0:1.11.27-4.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django@1.11.27-4.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "ruby-0:2.4.9-94.el7rhgs.src", "product": { "name": "ruby-0:2.4.9-94.el7rhgs.src", "product_id": "ruby-0:2.4.9-94.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby@2.4.9-94.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "product": { "name": "rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "product_id": "rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activemodel@5.2.0-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "product": { "name": "rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "product_id": "rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activesupport@5.2.0-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "product": { "name": "rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "product_id": "rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-bcrypt@3.1.12-2.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "product": { "name": "rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "product_id": "rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-concurrent-ruby@1.1.9-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-i18n-0:1.9.1-1.el7rhgs.src", "product": { "name": "rubygem-i18n-0:1.9.1-1.el7rhgs.src", "product_id": "rubygem-i18n-0:1.9.1-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-i18n@1.9.1-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "product": { "name": "rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "product_id": "rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mustermann@1.0.3-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "product": { "name": "rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "product_id": "rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nio4r@2.3.1-2.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-puma-0:4.3.12-1.el7rhgs.src", "product": { "name": "rubygem-puma-0:4.3.12-1.el7rhgs.src", "product_id": "rubygem-puma-0:4.3.12-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-puma@4.3.12-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-rack-0:2.2.4-1.el7rhgs.src", "product": { "name": "rubygem-rack-0:2.2.4-1.el7rhgs.src", "product_id": "rubygem-rack-0:2.2.4-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack@2.2.4-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "product": { "name": "rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "product_id": "rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack-protection@2.2.0-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "product": { "name": "rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "product_id": "rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-sinatra@2.2.0-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "product": { "name": "rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "product_id": "rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-thread_safe@0.3.6-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-tilt-0:2.0.11-1.el7rhgs.src", "product": { "name": "rubygem-tilt-0:2.0.11-1.el7rhgs.src", "product_id": "rubygem-tilt-0:2.0.11-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-tilt@2.0.11-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "product": { "name": "rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "product_id": "rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-tzinfo@1.2.10-1.el7rhgs?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "grafana-0:5.2.4-6.el7rhgs.x86_64", "product": { "name": "grafana-0:5.2.4-6.el7rhgs.x86_64", "product_id": "grafana-0:5.2.4-6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana@5.2.4-6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-0:2.4.9-94.el7rhgs.x86_64", "product": { "name": "ruby-0:2.4.9-94.el7rhgs.x86_64", "product_id": "ruby-0:2.4.9-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby@2.4.9-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "product": { "name": "ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "product_id": "ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-devel@2.4.9-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "product": { "name": "ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "product_id": "ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-libs@2.4.9-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "product": { "name": "rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "product_id": "rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-bigdecimal@1.3.2-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "product": { "name": "rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "product_id": "rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-did_you_mean@1.1.0-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "product": { "name": "rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "product_id": "rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-io-console@0.4.6-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "product": { "name": "rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "product_id": "rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-json@2.0.4-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "product": { "name": "rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "product_id": "rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-net-telnet@0.1.1-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "product": { "name": "rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "product_id": "rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openssl@2.0.9-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "product": { "name": "rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "product_id": "rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-psych@2.2.2-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "product": { "name": "ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "product_id": "ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-debuginfo@2.4.9-94.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "product": { "name": "rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "product_id": "rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-bcrypt@3.1.12-2.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "product": { "name": "rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "product_id": "rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-bcrypt-debuginfo@3.1.12-2.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "product": { "name": "rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "product_id": "rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nio4r@2.3.1-2.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "product": { "name": "rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "product_id": "rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nio4r-debuginfo@2.3.1-2.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "product": { "name": "rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "product_id": "rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-puma@4.3.12-1.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "product": { "name": "rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "product_id": "rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-puma-debuginfo@4.3.12-1.el7rhgs?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "product": { "name": "python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "product_id": "python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django-bash-completion@1.11.27-4.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python2-django-0:1.11.27-4.el7rhgs.noarch", "product": { "name": "python2-django-0:1.11.27-4.el7rhgs.noarch", "product_id": "python2-django-0:1.11.27-4.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-django@1.11.27-4.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "product": { "name": "python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "product_id": "python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-django-doc@1.11.27-4.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "ruby-doc-0:2.4.9-94.el7rhgs.noarch", "product": { "name": "ruby-doc-0:2.4.9-94.el7rhgs.noarch", "product_id": "ruby-doc-0:2.4.9-94.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-doc@2.4.9-94.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "ruby-irb-0:2.4.9-94.el7rhgs.noarch", "product": { "name": "ruby-irb-0:2.4.9-94.el7rhgs.noarch", "product_id": "ruby-irb-0:2.4.9-94.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-irb@2.4.9-94.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "product": { "name": "rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "product_id": "rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-minitest@5.10.1-94.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "product": { "name": "rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "product_id": "rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-power_assert@0.4.1-94.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "product": { "name": "rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "product_id": "rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rake@12.0.0-94.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "product": { "name": "rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "product_id": "rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rdoc@5.0.1-94.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "product": { "name": "rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "product_id": "rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-test-unit@3.2.3-94.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "product": { "name": "rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "product_id": "rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-xmlrpc@0.2.1-94.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygems-0:2.6.14.4-94.el7rhgs.noarch", "product": { "name": "rubygems-0:2.6.14.4-94.el7rhgs.noarch", "product_id": "rubygems-0:2.6.14.4-94.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygems@2.6.14.4-94.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch", "product": { "name": "rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch", "product_id": "rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygems-devel@2.6.14.4-94.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "product": { "name": "rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "product_id": "rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activemodel@5.2.0-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "product": { "name": "rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "product_id": "rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activemodel-doc@5.2.0-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "product": { "name": "rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "product_id": "rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activesupport@5.2.0-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "product": { "name": "rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "product_id": "rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activesupport-doc@5.2.0-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "product": { "name": "rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "product_id": "rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-bcrypt-doc@3.1.12-2.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "product": { "name": "rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "product_id": "rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-concurrent-ruby@1.1.9-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "product": { "name": "rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "product_id": "rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-concurrent-ruby-doc@1.1.9-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "product": { "name": "rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "product_id": "rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-i18n@1.9.1-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "product": { "name": "rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "product_id": "rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-i18n-doc@1.9.1-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "product": { "name": "rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "product_id": "rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mustermann@1.0.3-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "product": { "name": "rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "product_id": "rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mustermann-doc@1.0.3-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "product": { "name": "rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "product_id": "rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nio4r-doc@2.3.1-2.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "product": { "name": "rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "product_id": "rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-puma-doc@4.3.12-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "product": { "name": "rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "product_id": "rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack@2.2.4-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "product": { "name": "rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "product_id": "rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack-doc@2.2.4-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "product": { "name": "rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "product_id": "rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack-protection@2.2.0-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "product": { "name": "rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "product_id": "rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack-protection-doc@2.2.0-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "product": { "name": "rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "product_id": "rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-sinatra@2.2.0-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "product": { "name": "rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "product_id": "rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-sinatra-doc@2.2.0-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "product": { "name": "rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "product_id": "rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-thread_safe@0.3.6-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "product": { "name": "rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "product_id": "rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-thread_safe-doc@0.3.6-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "product": { "name": "rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "product_id": "rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-tilt@2.0.11-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "product": { "name": "rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "product_id": "rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-tilt-doc@2.0.11-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "product": { "name": "rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "product_id": "rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-tzinfo@1.2.10-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "product": { "name": "rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "product_id": "rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-tzinfo-doc@1.2.10-1.el7rhgs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grafana-0:5.2.4-6.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src" }, "product_reference": "grafana-0:5.2.4-6.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-0:5.2.4-6.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64" }, "product_reference": "grafana-0:5.2.4-6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-0:1.11.27-4.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src" }, "product_reference": "python-django-0:1.11.27-4.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch" }, "product_reference": "python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "python2-django-0:1.11.27-4.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch" }, "product_reference": "python2-django-0:1.11.27-4.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "python2-django-doc-0:1.11.27-4.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch" }, "product_reference": "python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-0:2.4.9-94.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src" }, "product_reference": "ruby-0:2.4.9-94.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-0:2.4.9-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64" }, "product_reference": "ruby-0:2.4.9-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64" }, "product_reference": "ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-devel-0:2.4.9-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64" }, "product_reference": "ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-doc-0:2.4.9-94.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch" }, "product_reference": "ruby-doc-0:2.4.9-94.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-irb-0:2.4.9-94.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch" }, "product_reference": "ruby-irb-0:2.4.9-94.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-libs-0:2.4.9-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64" }, "product_reference": "ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch" }, "product_reference": "rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activemodel-0:5.2.0-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src" }, "product_reference": "rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch" }, "product_reference": "rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch" }, "product_reference": "rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activesupport-0:5.2.0-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src" }, "product_reference": "rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch" }, "product_reference": "rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-bcrypt-0:3.1.12-2.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src" }, "product_reference": "rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64" }, "product_reference": "rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64" }, "product_reference": "rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch" }, "product_reference": "rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64" }, "product_reference": "rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch" }, "product_reference": "rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src" }, "product_reference": "rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch" }, "product_reference": "rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64" }, "product_reference": "rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-i18n-0:1.9.1-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch" }, "product_reference": "rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-i18n-0:1.9.1-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src" }, "product_reference": "rubygem-i18n-0:1.9.1-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch" }, "product_reference": "rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64" }, "product_reference": "rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-json-0:2.0.4-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64" }, "product_reference": "rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-minitest-0:5.10.1-94.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch" }, "product_reference": "rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch" }, "product_reference": "rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mustermann-0:1.0.3-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src" }, "product_reference": "rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch" }, "product_reference": "rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64" }, "product_reference": "rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nio4r-0:2.3.1-2.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src" }, "product_reference": "rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64" }, "product_reference": "rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64" }, "product_reference": "rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch" }, "product_reference": "rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64" }, "product_reference": "rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch" }, "product_reference": "rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-psych-0:2.2.2-94.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64" }, "product_reference": "rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-puma-0:4.3.12-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src" }, "product_reference": "rubygem-puma-0:4.3.12-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-puma-0:4.3.12-1.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64" }, "product_reference": "rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64 as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64" }, "product_reference": "rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch" }, "product_reference": "rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-0:2.2.4-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch" }, "product_reference": "rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-0:2.2.4-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src" }, "product_reference": "rubygem-rack-0:2.2.4-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch" }, "product_reference": "rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch" }, "product_reference": "rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-protection-0:2.2.0-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src" }, "product_reference": "rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch" }, "product_reference": "rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rake-0:12.0.0-94.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch" }, "product_reference": "rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch" }, "product_reference": "rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch" }, "product_reference": "rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-sinatra-0:2.2.0-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src" }, "product_reference": "rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch" }, "product_reference": "rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch" }, "product_reference": "rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch" }, "product_reference": "rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-thread_safe-0:0.3.6-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src" }, "product_reference": "rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch" }, "product_reference": "rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-tilt-0:2.0.11-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch" }, "product_reference": "rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-tilt-0:2.0.11-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src" }, "product_reference": "rubygem-tilt-0:2.0.11-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch" }, "product_reference": "rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch" }, "product_reference": "rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-tzinfo-0:1.2.10-1.el7rhgs.src as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src" }, "product_reference": "rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch" }, "product_reference": "rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch" }, "product_reference": "rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygems-0:2.6.14.4-94.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch" }, "product_reference": "rubygems-0:2.6.14.4-94.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" }, { "category": "default_component_of", "full_product_name": { "name": "rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch as a component of Red Hat Gluster 3.5 Web Administration on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" }, "product_reference": "rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-WebAdministration" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24790", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2071616" } ], "notes": [ { "category": "description", "text": "A HTTP request smuggling flaw was found in puma. This issue occurs when using puma behind a proxy. Puma does not validate incoming HTTP requests, as per RFC specification, leading to loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "puma-5.6.4: http request smuggling vulnerabilities", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch" ], "known_not_affected": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24790" }, { "category": "external", "summary": "RHBZ#2071616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071616" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24790", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24790" } ], "release_date": "2022-03-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-28T00:18:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "puma-5.6.4: http request smuggling vulnerabilities" }, { "cve": "CVE-2022-30122", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-06-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2099519" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in ruby-rack. An attacker crafting multipart POST requests can cause Rack\u0027s multipart parser to take much longer than expected, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: crafted multipart POST request may cause a DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch" ], "known_not_affected": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30122" }, { "category": "external", "summary": "RHBZ#2099519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099519" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30122", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30122" }, { "category": "external", "summary": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-30122.yml", "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-30122.yml" } ], "release_date": "2022-05-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-28T00:18:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rack: crafted multipart POST request may cause a DoS" }, { "cve": "CVE-2022-30123", "cwe": { "id": "CWE-179", "name": "Incorrect Behavior Order: Early Validation" }, "discovery_date": "2022-06-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2099524" } ], "notes": [ { "category": "description", "text": "A flaw was found in ruby gem-rack. This flaw allows a malicious actor to craft requests that can cause shell escape sequences to be written to the terminal via rack\u0027s `Lint` middleware and `CommonLogger` middleware. This issue can leverage these escape sequences to execute commands in the victim\u0027s terminal.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: crafted requests can cause shell escape sequences", "title": "Vulnerability summary" }, { "category": "other", "text": "- Because Red Hat OpenStack Platform 13.0 Operational Tools packaged the flawed code, but does not use its functionality, its Impact has been reduced to \u0027Low\u0027.\n- To exploit this vulnerability, applications should have either of these middlewares \u0027Lint\u0027 or \u0027CommonLogger\u0027 installed, and vulnerable apps may have something like this: \n\u0027use Rack::Lint\u0027 OR \u0027use Rack::CommonLogger\u0027\nThe Red Hat products use the flawed code but don\u0027t use its functionality, Hence, the impact is set to Important.\n- Logging Subsystem for Red Hat OpenShift uses the vulnerable ruby gem-rack package in the openshift-logging/fluentd-rhel8 component to instantiate client-to-server communication. But, this component cannot receive any requests so exploitation by crafted request consumption is not possible. Therefore the impact of this vulnerability on the Logging Subsystem for Red Hat OpenShift is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch" ], "known_not_affected": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30123" }, { "category": "external", "summary": "RHBZ#2099524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30123", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30123" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30123", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30123" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-wq4h-7r42-5hrr", "url": "https://github.com/advisories/GHSA-wq4h-7r42-5hrr" } ], "release_date": "2022-05-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-28T00:18:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "rubygem-rack: crafted requests can cause shell escape sequences" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64" ], "known_not_affected": [ "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-28T00:18:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-31163", "cwe": { "id": "CWE-23", "name": "Relative Path Traversal" }, "discovery_date": "2022-07-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2110551" } ], "notes": [ { "category": "description", "text": "A flaw was found in rubygem-tzinfo. When using the Timezone.get function, it fails to validate time zone identifiers correctly, allowing a new line character input within the identifier. This flaw allows an attacker to use the new line character and write any code, which will be executed within the Ruby process.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-tzinfo: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch" ], "known_not_affected": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31163" }, { "category": "external", "summary": "RHBZ#2110551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110551" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31163", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31163" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31163", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31163" }, { "category": "external", "summary": "https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx", "url": "https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx" } ], "release_date": "2022-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-28T00:18:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1486" }, { "category": "workaround", "details": "As a workaround, the time zone identifier can be validated before passing to TZInfo::Timezone.get by ensuring it matches the regular expression \\A[A-Za-z0-9+\\-_]+(?:\\/[A-Za-z0-9+\\-_]+)*\\z.", "product_ids": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:grafana-0:5.2.4-6.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:python-django-0:1.11.27-4.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:python-django-bash-completion-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:python2-django-doc-0:1.11.27-4.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:ruby-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-debuginfo-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-devel-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:ruby-doc-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-irb-0:2.4.9-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:ruby-libs-0:2.4.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activemodel-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-0:5.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-activesupport-doc-0:5.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-debuginfo-0:3.1.12-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bcrypt-doc-0:3.1.12-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-bigdecimal-0:1.3.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-0:1.1.9-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-concurrent-ruby-doc-0:1.1.9-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-did_you_mean-0:1.1.0-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-0:1.9.1-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-i18n-doc-0:1.9.1-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-io-console-0:0.4.6-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-json-0:2.0.4-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-minitest-0:5.10.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-0:1.0.3-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-mustermann-doc-0:1.0.3-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-net-telnet-0:0.1.1-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-debuginfo-0:2.3.1-2.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-nio4r-doc-0:2.3.1-2.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-openssl-0:2.0.9-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-power_assert-0:0.4.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-psych-0:2.2.2-94.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-debuginfo-0:4.3.12-1.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-puma-doc-0:4.3.12-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-0:2.2.4-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-doc-0:2.2.4-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rack-protection-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rake-0:12.0.0-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-rdoc-0:5.0.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-0:2.2.0-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-sinatra-doc-0:2.2.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-test-unit-0:3.2.3-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-0:0.3.6-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-thread_safe-doc-0:0.3.6-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-0:2.0.11-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tilt-doc-0:2.0.11-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-0:1.2.10-1.el7rhgs.src", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-tzinfo-doc-0:1.2.10-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygem-xmlrpc-0:0.2.1-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-0:2.6.14.4-94.el7rhgs.noarch", "7Server-RH-Gluster-3.5-WebAdministration:rubygems-devel-0:2.6.14.4-94.el7rhgs.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "rubygem-tzinfo: arbitrary code execution" } ] }
rhsa-2022_6507
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General\nAvailability release images, which fix security issues and bugs.\n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs. See the following\nRelease Notes documentation, which will be updated shortly for this\nrelease, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/\n\nSecurity fixes:\n\n* moment: inefficient parsing algorithim resulting in DoS (CVE-2022-31129)\n* vm2: Sandbox Escape in vm2 (CVE-2022-36067)\n\nBug fixes:\n\n* Submariner Globalnet e2e tests failed on MTU between On-Prem to Public clusters (BZ# 2074547)\n\n* OCP 4.11 - Install fails because of: pods \"management-ingress-63029-5cf6789dd6-\" is forbidden: unable to validate against any security context constrain (BZ# 2082254)\n\n* subctl gather fails to gather libreswan data if CableDriver field is missing/empty in Submariner Spec (BZ# 2083659)\n\n* Yaml editor for creating vSphere cluster moves to next line after typing (BZ# 2086883)\n\n* Submariner addon status doesn\u0027t track all deployment failures (BZ# 2090311)\n\n* Unable to deploy Hypershift operator on MCE hub using ManagedClusterAddOn without including s3 secret (BZ# 2091170)\n\n* After switching to ACM 2.5 the managed clusters log \"unable to create ClusterClaim\" errors (BZ# 2095481)\n\n* Enforce failed and report the violation after modified memory value in limitrange policy (BZ# 2100036)\n\n* Creating an application fails with \"This application has no subscription match selector (spec.selector.matchExpressions)\" (BZ# 2101577)\n\n* Inconsistent cluster resource statuses between \"All Subscription\" topology and individual topologies (BZ# 2102273)\n\n* managed cluster is in \"unknown\" state for 120 mins after OADP restore\n\n* RHACM 2.5.2 images (BZ# 2104553)\n\n* Subscription UI does not allow binding to label with empty value (BZ# 2104961)\n\n* Upgrade to 2.5.1 from 2.5.0 fails due to missing Subscription CRD (BZ# 2106069)\n\n* Region information is not available for Azure cloud in managedcluster CR (BZ# 2107134)\n\n* cluster uninstall log points to incorrect container name (BZ# 2107359)\n\n* ACM shows wrong path for Argo CD applicationset git generator (BZ# 2107885)\n\n* Single node checkbox not visible for 4.11 images (BZ# 2109134)\n\n* Unable to deploy hypershift cluster when enabling validate-cluster-security (BZ# 2109544)\n\n* Deletion of Application (including app related resources) from the console fails to delete PlacementRule for the application (BZ# 20110026)\n\n* After the creation by a policy of job or deployment (in case the object is missing)ACM is trying to add new containers instead of updating (BZ# 2117728)\n\n* pods in CrashLoopBackoff on 3.11 managed cluster (BZ# 2122292)\n\n* ArgoCD and AppSet Applications do not deploy to local-cluster (BZ# 2124707)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6507", "url": "https://access.redhat.com/errata/RHSA-2022:6507" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "2074547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074547" }, { "category": "external", "summary": "2082254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082254" }, { "category": "external", "summary": "2083659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083659" }, { "category": "external", "summary": "2086883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086883" }, { "category": "external", "summary": "2090311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090311" }, { "category": "external", "summary": "2091170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091170" }, { "category": "external", "summary": "2095481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095481" }, { "category": "external", "summary": "2100036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100036" }, { "category": "external", "summary": "2101577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101577" }, { "category": "external", "summary": "2102273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102273" }, { "category": "external", "summary": "2103653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103653" }, { "category": "external", "summary": "2104553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104553" }, { "category": "external", "summary": "2104961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104961" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2106069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106069" }, { "category": "external", "summary": "2107134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107134" }, { "category": "external", "summary": "2107359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107359" }, { "category": "external", "summary": "2107885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107885" }, { "category": "external", "summary": "2109134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109134" }, { "category": "external", "summary": "2110026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110026" }, { "category": "external", "summary": "2117728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117728" }, { "category": "external", "summary": "2122292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122292" }, { "category": "external", "summary": "2124707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124707" }, { "category": "external", "summary": "2124794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124794" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6507.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes", "tracking": { "current_release_date": "2024-12-18T00:36:37+00:00", "generator": { "date": "2024-12-18T00:36:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6507", "initial_release_date": "2022-09-13T21:48:13+00:00", "revision_history": [ { "date": "2022-09-13T21:48:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-13T21:48:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:36:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.5::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "product": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "product_id": "rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-proxy-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.5.2-42" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "product_id": "rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.5.2-25" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.5.2-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.5.2-4" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "product_id": "rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.5.2-11" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.5.2-6" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "product": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "product_id": "rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-proxy-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.5.2-42" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "product_id": "rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.5.2-25" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.5.2-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.5.2-4" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "product_id": "rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.5.2-11" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.5.2-6" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "product": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "product_id": "rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-proxy-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.5.2-42" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.5.2-25" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.5.2-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.5.2-4" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.5.2-11" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.5.2-6" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "product": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "product_id": "rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-proxy-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "product_id": "rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.5.2-42" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "product": { "name": "rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "product_id": "rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.5.2-25" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "product_id": "rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "product_id": "rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "product": { "name": "rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "product_id": "rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.5.2-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.5.2-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "product_id": "rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "product_id": "rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.5.2-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.5.2-6" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "product_id": "rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.5.2-4" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.5.2-9" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "product": { "name": "rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "product_id": "rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "product_id": "rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "product": { "name": "rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "product_id": "rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.5.2-10" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.5.2-11" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64", "product": { "name": "rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64", "product_id": "rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.5.2-5" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.5.2-6" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64" }, "product_reference": "rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64" }, "product_reference": "rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x" }, "product_reference": "rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le" }, "product_reference": "rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64" }, "product_reference": "rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64" }, "product_reference": "rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-13T21:48:13+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions about installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6507" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-36067", "cwe": { "id": "CWE-913", "name": "Improper Control of Dynamically-Managed Code Resources" }, "discovery_date": "2022-09-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124794" } ], "notes": [ { "category": "description", "text": "A flaw was found in the vm2 sandbox when running untrusted code, as the sandbox setup does not manage proper exception handling. This flaw allows an attacker to bypass the sandbox protections and gain remote code execution on the hypervisor host or the host which is running the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "vm2: Sandbox Escape in vm2", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36067" }, { "category": "external", "summary": "RHBZ#2124794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36067", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36067" }, { "category": "external", "summary": "https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq", "url": "https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq" } ], "release_date": "2022-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-13T21:48:13+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions about installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6507" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:02050ce97c1776f490b0bb2a120c507152d58bc9ca14ef595c64461b2e1689aa_amd64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:b3b740da052f2153ea2004d716d791de269400d7079037acc28b7ca3951f19bf_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:e25600720968b5fb633e8caec9fe648feebd498c94d5ea6dc87ace1bd293df8b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:f245bcab3e22e3354d9945eacea687f85e1e913269dfbc77fa84e43e20b4eb43_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0c8d97841e4355340cc9a277cfc9c4a11b423799643cdc029be954b7d41e2d6b_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:0f11d6673c31570b1ff04cd60efd2a76bd2ec4d597b68ab4ff749c74615adf28_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:1a684547abdcefca7d30261d7c9e6e148bd46a80fb482df276e1013dfb040e0f_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b2782113404ab02ccabf81a8b095709e6a110cf2c4e095c104452e39ad13ab16_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:3d4e502f6fbfdab0cfd445514effb15b9a1217df4865393e8f14083c2001876b_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:622de5066c99aec340b98dcc05b2ea41fb256a71c841a36a829cf5c92e190975_amd64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:a6857c25a90fad64dc48cf64cd1bb1a5bb7e260a497b232d694c3e1ced507eca_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ecf8bb20d50830fd95724e9455c43c79caeb1391b7520afe8a5ca15692e48a65_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba383a7c44edc06731ed19af4a0ee58119c917f1900a9c35ff3d99fd4569923_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:3ba4f63ccdb331f39c7a464e1a4aefc4940822a6a2b9bdab8c1da56d1e6cee85_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:948d0714816ef49b9a9b77fc37c2ce41b58c5228cc029e70427916badaf25016_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:f5ac3c2bdd4043fc8f46477f5396874612e1c88d1031265210dc5343c06d8edb_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:135220e6534bc5838011e7b2df998c13b94e065dac72d6a7e28788c36f60f05e_s390x", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:42fdc004f7be8c8ad6cab3f3bd3318d5bcaff61cf246ab36ec217d63d74c0b0a_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:5520ec880dc3eaa57f00b9cdf3d9a4aa780e41419e4a1cbe4496a641fcf7e2c3_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c204734d81913da381edfd28ad348224ef08ce2329806e4f0097695b2b29340b_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:47b84175e4c628671a3ba7a38157344f79de93b19e89600618cebd8d4fdc54de_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:6916a5d63d4a1c157086ab5a23bca4faf04964e62cca2818805bf22b9144d76a_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:d86f0bff18308721880af004f55b2d5503ab0f851c1e493338685f5e867524b1_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:f6e352c6920120ae43be1d5af8973c75478f0aea503b3b1e344991cf3334eb2f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:0389211ba7b579212893f5e48a2aaf8e8b20bd863d9c625282e540447a25d1af_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7ac0dbeb859af3c73a8abcdcea3cc049bf6f993134f7a20915f5d0c43fe3a609_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:bfb3889a7f3f29368781d4fab19c4f90dffc6f3e712cc4c9ddca76e1e2c46824_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:e15f397f6ef08b5baacc4b102cb27e0af8155bc89c898043af9c6d5f4dafb68e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:63386ffe1cd1a9a8473704d99b65479d1e45907005f3906fc6dd735b75ac8eba_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:70ad69df98322161fe5927df2351dca5f476b5da4c0db547f61e2b5d831d013e_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9b230d77800bd1b36ab5f48b37a7c63c3f71742eb30ba5f9dd85060a3a34f18c_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:ecd529ca2c9b8752ca7a6ddb1df8eb3073966a7c26727d0b5518efaf50967e55_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:2f3c285914f8aed133cf8bbd9a21066e4cc6f5efdbfe13df2297e7a69219aa24_s390x", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:9c1a0fcf5538b83849df0799f139c53728f083864ae82ef6e517c1235afac3b1_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:b49732ab0cbcd2861b7edf64c97ceb945f312d129f8c83a041bd488a4f519584_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:e30bc9bc607d9bdec3c08856d41c2de2c98fd608cc24adda1cf1676ec2cae4ea_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:159bf814bd3148496a2e0e5e752533e78286dbc889622217879182cf466ab18f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:492fa7a448c4aeea2d378e1784624729d191946cbd6f17698639132bfc64cb36_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:6cf5b122f7693212c8356f2bb25432e9fd7e1f1503ea1a2a45c1ed4debfe48ce_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:ee635d303a1a17b80f91d64866c6deb2f76acbc673dd7995e5a859cf6f16831c_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:716a7d68cd3b483ed3e8df37c13f890c6436d0fe799eb215167d4113596451d7_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:a2034c6019ff613119b12de378f61eb9cb72e1b5eb5c6821ea59da71d42b062f_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:dd788f10efe1f89008307455be8ccd60dbd33d40d3ab2a6ab0f6b8bccbfaac5f_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:f22d7a3790af665396fec9901a23bb3e668ce05d41867f8ba2418316ce137279_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:2a827f2c766d28de4134c87e85cb1ff3ee3c038fb6f1bd72ce30d1e8915e55e3_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:325358181203c6b85aed4cd2464dbab682d42b6099320b253039281462661f32_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:8abd4444dc566e3999c39a6bcd38d6e9861bdb2ea076ffff7fb1d1c804c3bef1_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ccefb962b9489c2c61f3905b3e96b05c4e58f21b5839e09978f0b0cc3f2c6ddc_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:0aab468f281646e5b2f39d11d944f48ed044cb8c29b868b82949debaaca8bb85_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:631e1e47ab07803c129b64aa6ab33bdb4fd3504da87fe1cf4c89d42bb804f45b_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:6a041aa61c2a527c7dd5e1f58a4370fd8650202f0b4d23be3a0dbbe743102ed0_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:7972110974e92b2afb0ed865533bafe3d262e74c27a9cb4de7716e55116092f4_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:58baff78b004117cbf41316c6b876ac9b32b37d7475ab5064d3bc4da3bb1eb44_ppc64le", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7e748efc8614184cd9ae6b4ab54398687c74b191e96f91ea8aae53483cbf9f83_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:a4dd71faa17928e3c828682b6d483ceabf4b5efd7588714c2672cca861e6fd79_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:cb96579ebe7602ec8f8af0a87738e910f92e16196c75bf1a0e3976150964ea20_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:448f3c46348ea8e034048a2140077715bfcdffd4c6b4285bb5dc1a26b0f1ca30_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:c5e755870cf4b5647b85e58a656126968353a017f6159c8c4da246996249aaa6_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce9c0bef4953313effd9c125b7c7d0a3e770881ebaaa854a8094b04873d4be17_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:fd6fddf63dba08e3285a29deaf98ec9d96f4975c6c84ff634b5933b6de36bd86_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:24eaabf1c6a0e1dadcf39583f31f03764777401a950f7c0b380b1ca8d04f828f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:c8ba053f144ba059563691e1118a337968651fa88e34d340c7f02c5d7acb8ed3_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e162b2153192ab610f075914934811c8ef34d89f67c54f151f05093d66868db6_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:e91af0da5711a67b3292722193c6dfb689caadd55a82005969db044ae160d0a6_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:30354b1b2edf0095bb2a3cabda1ee78b2bb7448c2fc008b4fe1b2239772688ee_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:cdeb30ef3bb56e8a9cf47720428a756a16cd5afc4e26c59f250155bfe02b7dd0_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:d8d26901899bbdac4837764459d7d962b7a7cbe4155ac4cf5920ad6ba0b42a71_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:e75fc9be47a46e662699d7b54b57d3cca5de9eee0b5c5d4b43177a6e0ebc9f54_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:161c808f3ebc92dba4082806ba8752ce8ce5ebeeac81d9b60845315c0f19776f_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:17b34a12b7afd4fbc34f3458d64c750a3987e7d58a09802750c0b1c1c36799a4_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:339431bf32db64a1af1e47ba25eb117eebec8cc0edd30bd929f06df64615c25e_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:dd17bfa01545acc66185150e7a32d82f71a1f8440ebcb752be4e800c0613d644_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:05de9575e3206158a8db8315f5dd223eb0d0ef0276af60e3ddc4c4fa1e9683bc_s390x", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:5bccd5d9aa2dcd5bf07147c584e9d0dccf0991a9f1816aa6817c9b0bd3066e12_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8074275285c62fe4e8bc7494f6ef6f5a85ce654ba054cddf7903bfb7cdd9cf84_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:e67e3b020fe8e28e2fb54722b924400ac5b71dd6003a3a20b4ad9028edf88668_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:676ad59e02a651d753ef05e62b9ebeca0b62e8edbe96a4b8832b9537d0af45d3_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:73b7c31de0f8c6a829121d53efd0ae545be35dd3b7b3f8b62abb9281f6adafff_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:a0dfb074e122daefc8697ea845070144d7deae5ace890e6c0db884db31bd3ab6_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ab2bfbefd4bff663ab8dc75fa00eb9dbbbc47a982d01a713831c866159196a47_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:662d2ed078fd384c676f18ce6fee19abb65d2e82052be970ee77643b1a6b4f4f_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:99503f891a74f0c31accd8fea4b5d6deeda575b0a3e95f2d563b4a00888f48c7_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:bbafb4b8099b8387d1f033ffc0409c18d5b25e5dee71367da4d1bc60ef378371_amd64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:fcd5e378dc44a675e3bda445db1094855f121199bcfa33a780ba82e18e713c3d_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:2f09bcc2c0ea068686baa7d5f16125c5ff38f211b89265f8ad574241817ab9b3_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:a61e6c6ba5ee779e5366b3626a912d7f1775de9c089e2ec360c1c70a09153795_s390x", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ced5eddd23879aaf93f6f3246fc86552a9b771f0a00d76e7d9603e85da500d02_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:f80cb20f31e7fd0c78c4db20cb4db0a455c814ed85ba219d8aaa6ddbdf9e2d29_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:37299a85b970571c4d449e860838d89569b46d6cc7d641fb8971fdcf52885317_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:42188b82712c4ecb4fe020f13eb8fac2bd68b00829c3daaf87f810594f22bdee_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:a9ed6f6381b355e972bc1603a9cfddaa3fb1c29ea0515d396e01835f00a0121f_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:ad357e505777a7a2eba6ce843d6c865392460bbe74818dbf0ff67685a03c00ab_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:14dd67b343be7baa12476e52d35f2bf064b9073596a288dc75f89980d0a06147_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b4db6c7475e40abc6b6ad1114153817a18cfa494a5ab74f8abebc02245b97d7_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5bb46827b15dd2d3e311eee6ed0dead1c140f8e1ce3994c6e68d8720f9a22c35_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:6e0e54482d3e6c512298e77921e1a45a39369fbe9e05b22997372b14ec4c83b8_s390x", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:0cd9af606b9889e83809f7690bade72234121ee26a07f4d5b88836e60ca28b34_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:4f94655076b99de104974deb5baf44808a04a97afe35db7a0ee4a9e3463a3b5a_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:62e5b18d06fb0e578a4b4b45169f767b576559a3bc4b8c55ecd5fa08386948a4_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:ea8892c831002e88c740f4c92b0a9f8595f9c2a7e991dbe57df91f56b551dc7b_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:0d981407718f646aa3115882df59275cb2d44a7352f9ee51ca515c4cc1436d92_amd64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:68be8c5b4fc3570d98c9b35c0884a4c2421a5072c9756b9ab99802dabdc49643_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:c267103987b8241e27ff94ff5951f55d00863436ea9c2808b03f8a7f728f8e3b_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:ec0de599af6c45d4ab0aa9b6b9031941bec457c1d774351a353693ca5e9ed1b7_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:303b78bc950f26ce87f37153e9e513c0465cbf79f25bb406f6b2a1e6dac288ad_s390x", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:91633657c5aef1e519cd823d271f64a026978ea0057fe0f5a7cf25531189da3e_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:938eb04191d29e7e87a349c298978f0ff00d8866a621df1d080184fa17501e1a_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:dbbe7f655523024d6da8381bb4047fef15ace15ade3a5c0c1cab32ccce384583_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:223a1085ee1041087d70c533b410076b99f811534d89369aef73bbd5c50a0139_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:45ab01496d4ff08a0d1073655a74ca1dcd0179e7a31fc0031e010e4f0c12b61d_arm64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:5446be33e383f08176b86da78aaf65f9f6810c50b0b316f0db4611e273e57e53_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:abe1ca3f4840511be0c4c99471d4a41054cf3bf0e203cebde5bed5842676054c_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:5f1b7176d9be686effdf3b2c50e55171032786feecc679508c9693501f80f8a0_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:9a5c1e2add9ef4c565796951881cf6765595381ca07538ab04667a0898561617_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:baaa7213b3aca6ce9656fc1136f3523ebda170258a0d9946470b2474f4ded24a_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:d80416027330ef18ba3d2a6cd9911d7d7643e35fb33905615c9d18b5704cadd7_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:74b2608a91d1055151b067d79300ea18a92fa600d0c42baeb24654d96acdcb5e_ppc64le", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:79da438cfcbcbdc4a8ed9e3709d99aa7e51a8fccc50781bbbdf586ce1a5ec96c_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:88b312eae99c032736afab6d2d1aae68b272f73aa96dd3fbb2bf335e3e90b13d_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d29df179f27366c885c57239c7666ce99d3b74362f1e501c3f7626f556ef06ff_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:192a38a1e431f236cb1ed812c7bb78fafa47272e91e009f797e01c2e3e565cd7_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:2e9469ca72f4111d9da95a0cbda59c24c500241d7dd51c94356cdd4af8c869fe_arm64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:e23b6aea1e3f4dcec4f1150570d90927824197ab35502044ed400f153ccccecb_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f9a52a288ed5015e7f824c52c26150afe271906f7c5102e5682b322205df887c_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:0fef358752c51b9696bf5b64b43718e396347b28ef2a635532184ece09c41533_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:187ff5e4e8c77012fe7493c5aa0b26f8674a1e1f98cd2d11ccae11938e7e3228_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:94aa5d469c074f34ef5e87298120e47dc6c1209bed3946907849a954771ba3f9_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:c4acfd23ab98562dc3d29d3f6b3d1af09ed63aca630caadb50197693bb1d6224_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:070ab7da05f895eaee6a439d4890789a3a3c922c0f481550baabdf1713ec4d66_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:862229ad484c8a2fb68f6c121bcf82cba1063b87f023d4077f9fcaea6c1d1213_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:c0bca218a4fa24e883a2e6d14ec724e57b92d371414142ddb5f528814dcaec63_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:e785dad70b5efe5f2a586e98eecc15022204a90dd7486453f9b22563f227b667_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:0f8a08d260ef63a8ef29152d2dac5bb819a3ed84046dbd6e5f7ab0374a4afaf0_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:9a08de6473513a209c0631e3bd2ac586ab967e55b0b98a79741b52ec70a9dd15_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e050748ccb2c24655b96726fe61abd910d3842488665087c4174199da1efccdb_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:e3dbe04070d7334be484eca582d4277954b64eaf581315a2ff355f78fdc5871a_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:139bf1bb807408c7e2883e43165389ea17d2893f81b3c6c6844cfd63ae6d9e70_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:435a3afc4255847bbaca4a806283890b6d9a07b75d5fe04277db1b1a0068c042_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:7dc9b244e2fc0f19cf13d4d864b84415b3967b5bc4b9c4c188c4ecc0583fc55c_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:936c0b70f8d4299b8c5a60ce0a59394b60171d9975e679f6bf0e72e568a26b27_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3089873ee09ad72e9df2cdfb47182e5018d85d0bd028e6dcfdf67d8e298a96d7_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:3beb005df3da71f6d1f67d6b6b5e38c39466332106f9d1fc122b496c977bd56b_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:5edd63d851cdc29ad899c7cac8f037de48477dcf84fe4b172eac8c1cbccb1e2d_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:a70e6502495dbe4505271a572c63b89df03fbe6fa080e9864736da55ab0d6a41_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:41c2a4ad792ad8be7036377a3c65bc855a6ef290fcd838196b8036c71fe531ba_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6cee0c4f142811d312b03cd99d137d3c02dc24f6d557939efee96a8529c8b67a_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:ccef445cc7dd3a23225683b383d542942a9bae373f2edb57e0e0fdc5905d8ff3_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:cd40792012ee489a6b8c4c424411102d257620d0dc1c0f20ea1853438308ecbb_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:56004fa24f3242224cdbe5cd9780553c00fd4434437f794a900dab8b4347fdda_amd64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:bfa6b8a88ffbde4bd23a9a93f0209d6302f488051646b3e3a40ff48e1fcafdfa_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:c9d4451cf98600b2ac9a1e3b7940199196b085bdb11700a65903db67fe29ec0e_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:ec256cf1d7d5c9a146789cbef21cd2461cf3a9951fd969adaf43f799ca94721e_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:0d90c18ecdf319a5eb6c3c2d11108174d186dac74efe9ff538cb1a74ff85e13b_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:7be0c7a4a092074758d96b706581d1d9329417273e5be97db1018f5c911fde9d_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:a0eee85bfc20b1a4c5d3bb3d10510514bcef75d1b60dfedec37ff97399d190ed_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:b1978293860473fc6fe061f9eed6e889a2d9d6a55a0eb23d7701e34cd350a3da_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:25ffe40b11cd44301ca37135869a6a50b326c02a254a2df3c7420b04761f7860_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:26e348966a276d532721d07534e202b0ad0c10d05fbf2d826ab253daf3910d3c_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:76f22699aa79ad674087d9efa3bfdc118bbafb07db876d7c4627ac850712fef7_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:e31655280d1e9688d7bbd833262c052859cabaefd743e57f2a24d498ffc0683f_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:a755adfc19120e8525bbd68530c0e2705c284674dcb26dc4d1195f751e30915b_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:bbbd676b8bfc1d62883086507e981a51b412180c7efc5181fbc17fe8a11cf376_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:cf7674c18edc52cddd12f087c9519e08e3417303b7addfbaf9020ff1b38431f7_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:e9e9f0b8cd504756111d98c506c879a52f8fe250004e1cf26faeffb6a260f918_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:2b169250b2ac6015fb8b281de459b75984a3cb502515e3fc5b102713b036fef3_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:c83ade423e88fd0c2598a80877ba467d1f90375be8506642ef97cb8d521db006_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cb88b12e61ba513f0f5fb0b690b43f839e1845cc3c8ba57f33d1f913c4cb77ec_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:cbd052da7370a11b87dbd21d759a6fc8cc8f8fd88f8b2517b08bef557e78f430_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:26ab46b1cc5467675164f69181ea23390042b9f3b15191e1eb42ec793454bc6d_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:3f4f7d5823b624e00d2b98bd7202e678a272f0daacf30b6b24f3e702afb4d042_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:cfb235d7f901b43e5b26a68bf6a54c3a1373e38d9af4bd4a8914a01d77dbb10b_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:d79217ea1186a7e72e07141a12af2ca7dc6694946920105a428a1cdf955ce55f_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:21e88e7b0301560c21d2fd4bdaf0272cbb9098c5986ccf00f87bb0b08432ab2d_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:30f20b6bc0f393d183baa10ba31a0be9fbe1299b7502ed47ee60cbbe43d90332_arm64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:7bb1efc63ff6252894fb26c0f29d0361edca9d672b32dab4bb4afda93cbe0083_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:ce8708ad193e2dfa26eacdde2772097b1298845da502a4dc27b515604af5639f_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:88dfa36c84c4d737c3bc6f15a1c6ec7f52315bc935429b30e81ae4246c90f4a5_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:8a7dddc303eeb8880aa1e6db6c1f7fc9768532e6350fc70a4423ad663c25f640_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:bd9475572daa0d5b7ed8c46db97e643438096c6bcf95bc6f3ac668cf18b45303_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:dded1ecc98fd363d585a2470947525307339e0514fb110cfd93baa9505e47a4c_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:9f32c46b4752f02031061e8151265647dc906727fe27faabd8f97841d6e6411b_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ca71a92b25e7d3cc6d9aee183b74817c6c76d00b9a6e80692dd4076d7b3168c1_ppc64le", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:cf30e0c25596857295c901599f2ad5ca724d61c6ffa945db2b2f41bc76b2f077_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:d013c2a2f72232ee1d762458b8f805efb419a811a3210973ca15ae374fbbafb3_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:193db866b65fb4224ac2d28a944aec5312713c9e2d686103f71109777a6b6e54_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a8213b6065a981a3a4ac66757c51e8f1cc866a1399baa1b32c536fbe3740a94f_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:ad4ffea47a4b53f7820a9d58a63b2ec5e0626d320dfa076da1f8047e8103941d_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:e254aa207746ee1957771788c0cc816fc64cab020f6d06b4d920160b8cb4f6f0_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:137af85795a71e21b194cb683d702b8455fc28a090a8816e0b47880685a2fd60_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:3d1e719915a331b2aa576b7f43fcf664463356fe05dad5a96e19d876f67b59b6_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:b1519de7cc5136781dc2c69cc7a2e95f5ba095677425c3d0170db1b5e97a4fb5_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:da6afebb026ada6c1785623e27a31be7f07214645423edf4f80c11cb7040d0af_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:65c0a6cea5f2afdc7db98452f2630a796023708eac47380a47fd650c4f860a91_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:893861ceb951a1eae33824e38358d17a554fd39556b67434f72407e115122668_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:bae0a43f20ef6dc9dc0f90027ca9b1bc83a966b872b13f9bc8e3d47a8c894202_arm64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:c44b84e1ed3ef06d080edfcf1b1f02160e484a5a6cce4c27f6e51b88c93a93e5_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:13adfd62d6ac65bed88b92208b91c6d70753b56ac3a5e17e746f89760bec883c_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1638fe0aa2ea3ccbe4fa96494f56db48897be4e27cdcef0fe32ba5a161d66fbb_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:5f3dae63650375f3c329686ab9cc0455301f8e0d97280c4f60f274efb75f54e3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:84c83269fe7756df1ef5d3dc112b10a383f67975cda8b00b7d1c6ace800a8d37_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:0dd899045dffc8463e4a67d8a73479b51846b4747c31e215d1532fe07024be63_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:3347d8305fc74a463695d290b60f7227859b9bab03e805c7074d0984a27c9be3_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:bb2f3397974151b46b567d18d57cc586defeb9b64b9c7c9178ecc404940118ab_amd64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:c6c7198b37803fef959c4c2eae172b021e4f12c7603b96c5de849a9eb23ec06d_arm64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "vm2: Sandbox Escape in vm2" } ] }
rhsa-2023_3623
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New packages for Red Hat Ceph Storage 6.1 are now available on Red Hat Enterprise Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.\n\nThese new packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the\nmost significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index\n\nSecurity Fix(es):\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* angular: XSS vulnerability (CVE-2021-4231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll users of Red Hat Ceph Storage are advised to update to these packages that provide numerous enhancements and bug fixes.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3623", "url": "https://access.redhat.com/errata/RHSA-2023:3623" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index" }, { "category": "external", "summary": "1467648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1467648" }, { "category": "external", "summary": "1600995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600995" }, { "category": "external", "summary": "1783271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783271" }, { "category": "external", "summary": "1794550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1794550" }, { "category": "external", "summary": "1929760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929760" }, { "category": "external", "summary": "1932764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932764" }, { "category": "external", "summary": "1937618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937618" }, { "category": "external", "summary": "1975689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975689" }, { "category": "external", "summary": "1991808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991808" }, { "category": "external", "summary": "2004175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004175" }, { "category": "external", "summary": "2016288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016288" }, { "category": "external", "summary": "2016949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016949" }, { "category": "external", "summary": "2024444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024444" }, { "category": "external", "summary": "2025815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025815" }, { "category": "external", "summary": "2028058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028058" }, { "category": "external", "summary": "2029714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029714" }, { "category": "external", "summary": "2036063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036063" }, { "category": "external", "summary": "2053347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053347" }, { "category": "external", "summary": "2053471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053471" }, { "category": "external", "summary": "2064260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064260" }, { "category": "external", "summary": "2064265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064265" }, { "category": "external", "summary": "2067709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067709" }, { "category": "external", "summary": "2076709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076709" }, { "category": "external", "summary": "2080926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080926" }, { "category": "external", "summary": "2082666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082666" }, { "category": "external", "summary": "2092506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092506" }, { "category": "external", "summary": "2094052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094052" }, { "category": "external", "summary": "2097027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097027" }, { "category": "external", "summary": "2097187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097187" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2105950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105950" }, { "category": "external", "summary": "2106421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106421" }, { "category": "external", "summary": "2108228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108228" }, { "category": "external", "summary": "2108489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108489" }, { "category": "external", "summary": "2109224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109224" }, { "category": "external", "summary": "2110290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110290" }, { "category": "external", "summary": "2111282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111282" }, { "category": "external", "summary": "2111364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111364" }, { "category": "external", "summary": "2111680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111680" }, { "category": "external", "summary": "2111751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111751" }, { "category": "external", "summary": "2112309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112309" }, { "category": "external", "summary": "2114835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114835" }, { "category": "external", "summary": "2120624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120624" }, { "category": "external", "summary": "2124441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124441" }, { "category": "external", "summary": "2127345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127345" }, { "category": "external", "summary": "2127926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127926" }, { "category": "external", "summary": "2129861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129861" }, { "category": "external", "summary": "2132554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132554" }, { "category": "external", "summary": "2133341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133341" }, { "category": "external", "summary": "2133549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133549" }, { "category": "external", "summary": "2133802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133802" }, { "category": "external", "summary": "2136031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136031" }, { "category": "external", "summary": "2136304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136304" }, { "category": "external", "summary": "2136336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136336" }, { "category": "external", "summary": "2137596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137596" }, { "category": "external", "summary": "2138793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138793" }, { "category": "external", "summary": "2138794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138794" }, { "category": "external", "summary": "2138933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138933" }, { "category": "external", "summary": "2139694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139694" }, { "category": "external", "summary": "2139769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139769" }, { "category": "external", "summary": "2140074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140074" }, { "category": "external", "summary": "2140784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140784" }, { "category": "external", "summary": "2141110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141110" }, { "category": "external", "summary": "2142167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142167" }, { "category": "external", "summary": "2142431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142431" }, { "category": "external", "summary": "2143285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143285" }, { "category": "external", "summary": "2145104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145104" }, { "category": "external", "summary": "2146544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2146544" }, { "category": "external", "summary": "2146546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2146546" }, { "category": "external", "summary": "2147346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147346" }, { "category": "external", "summary": "2147348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147348" }, { "category": "external", "summary": "2149259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149259" }, { "category": "external", "summary": "2149415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149415" }, { "category": "external", "summary": "2149533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149533" }, { "category": "external", "summary": "2151189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151189" }, { "category": "external", "summary": "2152963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152963" }, { "category": "external", "summary": "2153196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153196" }, { "category": "external", "summary": "2153452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153452" }, { "category": "external", "summary": "2153533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153533" }, { "category": "external", "summary": "2153673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153673" }, { "category": "external", "summary": "2153726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153726" }, { "category": "external", "summary": "2158689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158689" }, { "category": "external", "summary": "2159294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159294" }, { "category": "external", "summary": "2159307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159307" }, { "category": "external", "summary": "2160598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160598" }, { "category": "external", "summary": "2161479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161479" }, { "category": "external", "summary": "2161483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161483" }, { "category": "external", "summary": "2163473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163473" }, { "category": "external", "summary": "2164327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164327" }, { "category": "external", "summary": "2168541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168541" }, { "category": "external", "summary": "2172791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172791" }, { "category": "external", "summary": "2175307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175307" }, { "category": "external", "summary": "2180110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180110" }, { "category": "external", "summary": "2180567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180567" }, { "category": "external", "summary": "2181055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181055" }, { "category": "external", "summary": "2182022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182022" }, { "category": "external", "summary": "2182035", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182035" }, { "category": "external", "summary": "2182564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182564" }, { "category": "external", "summary": "2182613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182613" }, { "category": "external", "summary": "2184268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184268" }, { "category": "external", "summary": "2185588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185588" }, { "category": "external", "summary": "2185772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185772" }, { "category": "external", "summary": "2186095", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186095" }, { "category": "external", "summary": "2186126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186126" }, { "category": "external", "summary": "2186472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186472" }, { "category": "external", "summary": "2186557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186557" }, { "category": "external", "summary": "2186738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186738" }, { "category": "external", "summary": "2186760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186760" }, { "category": "external", "summary": "2186774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186774" }, { "category": "external", "summary": "2187265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187265" }, { "category": "external", "summary": "2187394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187394" }, { "category": "external", "summary": "2187617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187617" }, { "category": "external", "summary": "2187659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187659" }, { "category": "external", "summary": "2188266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188266" }, { "category": "external", "summary": "2188460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188460" }, { "category": "external", "summary": "2189308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189308" }, { "category": "external", "summary": "2190412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2190412" }, { "category": "external", "summary": "2196421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196421" }, { "category": "external", "summary": "2196920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196920" }, { "category": "external", "summary": "2203098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203098" }, { "category": "external", "summary": "2203160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203160" }, { "category": "external", "summary": "2203747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203747" }, { "category": "external", "summary": "2204479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2204479" }, { "category": "external", "summary": "2207702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207702" }, { "category": "external", "summary": "2207718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207718" }, { "category": "external", "summary": "2209109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209109" }, { "category": "external", "summary": "2209300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209300" }, { "category": "external", "summary": "2209375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209375" }, { "category": "external", "summary": "2209970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209970" }, { "category": "external", "summary": "2210698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210698" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3623.json" } ], "title": "Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security and bug fix update", "tracking": { "current_release_date": "2024-12-18T00:38:54+00:00", "generator": { "date": "2024-12-18T00:38:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:3623", "initial_release_date": "2023-06-15T09:19:13+00:00", "revision_history": [ { "date": "2023-06-15T09:19:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-06-15T09:19:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:38:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ceph Storage 6.1 Tools", "product": { "name": "Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:6.1::el9" } } } ], "category": "product_family", "name": "Red Hat Ceph Storage" }, { "branches": [ { "category": "product_version", "name": "cephadm-ansible-0:2.15.0-1.el9cp.src", "product": { "name": "cephadm-ansible-0:2.15.0-1.el9cp.src", "product_id": "cephadm-ansible-0:2.15.0-1.el9cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephadm-ansible@2.15.0-1.el9cp?arch=src" } } }, { "category": "product_version", "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "product": { "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "product_id": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-collection-ansible-posix@1.2.0-1.3.el9ost?arch=src" } } }, { "category": "product_version", "name": "ceph-2:17.2.6-70.el9cp.src", "product": { "name": "ceph-2:17.2.6-70.el9cp.src", "product_id": "ceph-2:17.2.6-70.el9cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph@17.2.6-70.el9cp?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cephadm-ansible-0:2.15.0-1.el9cp.noarch", "product": { "name": "cephadm-ansible-0:2.15.0-1.el9cp.noarch", "product_id": "cephadm-ansible-0:2.15.0-1.el9cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephadm-ansible@2.15.0-1.el9cp?arch=noarch" } } }, { "category": "product_version", "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "product": { "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "product_id": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-collection-ansible-posix@1.2.0-1.3.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "ceph-mib-2:17.2.6-70.el9cp.noarch", "product": { "name": "ceph-mib-2:17.2.6-70.el9cp.noarch", "product_id": "ceph-mib-2:17.2.6-70.el9cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mib@17.2.6-70.el9cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "product": { "name": "ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "product_id": "ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-resource-agents@17.2.6-70.el9cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "cephadm-2:17.2.6-70.el9cp.noarch", "product": { "name": "cephadm-2:17.2.6-70.el9cp.noarch", "product_id": "cephadm-2:17.2.6-70.el9cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephadm@17.2.6-70.el9cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "cephfs-top-2:17.2.6-70.el9cp.noarch", "product": { "name": "cephfs-top-2:17.2.6-70.el9cp.noarch", "product_id": "cephfs-top-2:17.2.6-70.el9cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephfs-top@17.2.6-70.el9cp?arch=noarch\u0026epoch=2" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ceph-base-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-base-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-base-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-common-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-common-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-fuse-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-fuse-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-selinux-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-selinux-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "product_id": "libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libcephfs2-2:17.2.6-70.el9cp.x86_64", "product_id": "libcephfs2-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librados-devel-2:17.2.6-70.el9cp.x86_64", "product_id": "librados-devel-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librados2-2:17.2.6-70.el9cp.x86_64", "product_id": "librados2-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libradospp-devel-2:17.2.6-70.el9cp.x86_64", "product_id": "libradospp-devel-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libradosstriper1-2:17.2.6-70.el9cp.x86_64", "product_id": "libradosstriper1-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librbd-devel-2:17.2.6-70.el9cp.x86_64", "product_id": "librbd-devel-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librbd1-2:17.2.6-70.el9cp.x86_64", "product_id": "librbd1-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librgw-devel-2:17.2.6-70.el9cp.x86_64", "product_id": "librgw-devel-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librgw2-2:17.2.6-70.el9cp.x86_64", "product_id": "librgw2-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-argparse@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-common@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-cephfs-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-cephfs-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rados-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rados-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rbd-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rbd-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rgw-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rgw-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:17.2.6-70.el9cp.x86_64", "product": { "name": "rbd-nbd-2:17.2.6-70.el9cp.x86_64", "product_id": "rbd-nbd-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debugsource@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-exporter-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephfs-mirror-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephsqlite-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-fuse-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_id": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd-debuginfo@17.2.6-70.el9cp?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ceph-base-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-base-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-base-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-common-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-common-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "product_id": "libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libcephfs2-2:17.2.6-70.el9cp.ppc64le", "product_id": "libcephfs2-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librados-devel-2:17.2.6-70.el9cp.ppc64le", "product_id": "librados-devel-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librados2-2:17.2.6-70.el9cp.ppc64le", "product_id": "librados2-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "product_id": "libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "product_id": "libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librbd-devel-2:17.2.6-70.el9cp.ppc64le", "product_id": "librbd-devel-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librbd1-2:17.2.6-70.el9cp.ppc64le", "product_id": "librbd1-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librgw-devel-2:17.2.6-70.el9cp.ppc64le", "product_id": "librgw-devel-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librgw2-2:17.2.6-70.el9cp.ppc64le", "product_id": "librgw2-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-argparse@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-common@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rados-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rados-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rbd-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rbd-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rgw-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rgw-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "product_id": "rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debugsource@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-exporter-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephfs-mirror-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephsqlite-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-fuse-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_id": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd-debuginfo@17.2.6-70.el9cp?arch=ppc64le\u0026epoch=2" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ceph-base-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-base-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-base-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-common-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-common-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-fuse-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-fuse-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-selinux-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-selinux-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:17.2.6-70.el9cp.s390x", "product": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.s390x", "product_id": "libcephfs-devel-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:17.2.6-70.el9cp.s390x", "product": { "name": "libcephfs2-2:17.2.6-70.el9cp.s390x", "product_id": "libcephfs2-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:17.2.6-70.el9cp.s390x", "product": { "name": "librados-devel-2:17.2.6-70.el9cp.s390x", "product_id": "librados-devel-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:17.2.6-70.el9cp.s390x", "product": { "name": "librados2-2:17.2.6-70.el9cp.s390x", "product_id": "librados2-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:17.2.6-70.el9cp.s390x", "product": { "name": "libradospp-devel-2:17.2.6-70.el9cp.s390x", "product_id": "libradospp-devel-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:17.2.6-70.el9cp.s390x", "product": { "name": "libradosstriper1-2:17.2.6-70.el9cp.s390x", "product_id": "libradosstriper1-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:17.2.6-70.el9cp.s390x", "product": { "name": "librbd-devel-2:17.2.6-70.el9cp.s390x", "product_id": "librbd-devel-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:17.2.6-70.el9cp.s390x", "product": { "name": "librbd1-2:17.2.6-70.el9cp.s390x", "product_id": "librbd1-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:17.2.6-70.el9cp.s390x", "product": { "name": "librgw-devel-2:17.2.6-70.el9cp.s390x", "product_id": "librgw-devel-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:17.2.6-70.el9cp.s390x", "product": { "name": "librgw2-2:17.2.6-70.el9cp.s390x", "product_id": "librgw2-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "product_id": "python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-argparse@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-common-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.s390x", "product_id": "python3-ceph-common-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-common@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-cephfs-2:17.2.6-70.el9cp.s390x", "product_id": "python3-cephfs-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rados-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rados-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rbd-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rbd-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rgw-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rgw-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:17.2.6-70.el9cp.s390x", "product": { "name": "rbd-nbd-2:17.2.6-70.el9cp.s390x", "product_id": "rbd-nbd-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debugsource-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-debugsource-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debugsource@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-exporter-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-immutable-object-cache-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cephfs-mirror-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephsqlite-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-fuse-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_id": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd-debuginfo@17.2.6-70.el9cp?arch=s390x\u0026epoch=2" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch" }, "product_reference": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src" }, "product_reference": "ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-2:17.2.6-70.el9cp.src as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src" }, "product_reference": "ceph-2:17.2.6-70.el9cp.src", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-base-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-base-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-base-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-common-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-common-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-common-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-debugsource-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-fuse-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-fuse-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mib-2:17.2.6-70.el9cp.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch" }, "product_reference": "ceph-mib-2:17.2.6-70.el9cp.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-resource-agents-2:17.2.6-70.el9cp.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch" }, "product_reference": "ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-selinux-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-selinux-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephadm-2:17.2.6-70.el9cp.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch" }, "product_reference": "cephadm-2:17.2.6-70.el9cp.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephadm-ansible-0:2.15.0-1.el9cp.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch" }, "product_reference": "cephadm-ansible-0:2.15.0-1.el9cp.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephadm-ansible-0:2.15.0-1.el9cp.src as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src" }, "product_reference": "cephadm-ansible-0:2.15.0-1.el9cp.src", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "cephfs-top-2:17.2.6-70.el9cp.noarch as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch" }, "product_reference": "cephfs-top-2:17.2.6-70.el9cp.noarch", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libcephfs-devel-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libcephfs2-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libcephfs2-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libcephfs2-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librados-devel-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librados-devel-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librados-devel-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librados2-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librados2-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librados2-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libradospp-devel-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libradospp-devel-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libradosstriper1-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libradosstriper1-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librbd-devel-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librbd-devel-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librbd-devel-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librbd1-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librbd1-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librbd1-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librgw-devel-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librgw-devel-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librgw-devel-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librgw2-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librgw2-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librgw2-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-ceph-common-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-common-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-cephfs-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-cephfs-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rados-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rados-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rados-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rbd-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rbd-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rbd-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rgw-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rgw-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rgw-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x" }, "product_reference": "rbd-nbd-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "rbd-nbd-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le" }, "product_reference": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x" }, "product_reference": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" }, "product_reference": "rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-4231", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2022-05-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2094052" } ], "notes": [ { "category": "description", "text": "A flaw was found in the angular/core package. Affected versions of this package are vulnerable to Cross-site scripting (XSS) in development, with Server-side rendering (SSR enabled).", "title": "Vulnerability description" }, { "category": "summary", "text": "angular: XSS vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for dotnet-5.0, therefore it will not be addressed in this version of dotnet. For more information, please see https://access.redhat.com/support/policy/updates/net-core.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4231" }, { "category": "external", "summary": "RHBZ#2094052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094052" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4231", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4231" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4231", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4231" } ], "release_date": "2020-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T09:19:13+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage cluster using cephadm in the Red Hat Storage Ceph Upgrade Guide (https://access.redhat.com/documentation/en-us/red_hat_ceph_storage).", "product_ids": [ "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "angular: XSS vulnerability" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T09:19:13+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage cluster using cephadm in the Red Hat Storage Ceph Upgrade Guide (https://access.redhat.com/documentation/en-us/red_hat_ceph_storage).", "product_ids": [ "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.noarch", "9Base-RHCEPH-6.1-Tools:ansible-collection-ansible-posix-0:1.2.0-1.3.el9ost.src", "9Base-RHCEPH-6.1-Tools:ceph-2:17.2.6-70.el9cp.src", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-base-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-common-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-debugsource-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-exporter-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-immutable-object-cache-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mds-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mgr-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-mib-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-mon-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-osd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-radosgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-resource-agents-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-selinux-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:ceph-test-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephadm-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:cephadm-ansible-0:2.15.0-1.el9cp.src", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:cephfs-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:cephfs-top-2:17.2.6-70.el9cp.noarch", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephfs2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libcephsqlite-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados-devel-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librados2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradospp-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:libradosstriper1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librbd1-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw-devel-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:librgw2-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-argparse-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-ceph-common-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-cephfs-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rados-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rbd-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:python3-rgw-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-fuse-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-mirror-debuginfo-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-2:17.2.6-70.el9cp.x86_64", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.ppc64le", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.s390x", "9Base-RHCEPH-6.1-Tools:rbd-nbd-debuginfo-2:17.2.6-70.el9cp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_6422
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Multicluster Engine for Kubernetes 2.0.2 General Availability release images, \nwhich fix bugs and update container images.\n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Multicluster Engine for Kubernetes 2.0.2 images\n\nMulticluster engine for Kubernetes provides the foundational components\nthat are necessary for the centralized management of multiple\nKubernetes-based clusters across data centers, public clouds, and private\nclouds.\n\nYou can use the engine to create new Red Hat OpenShift Container Platform\nclusters or to bring existing Kubernetes-based clusters under management by\nimporting them. After the clusters are managed, you can use the APIs that\nare provided by the engine to distribute configuration based on placement\npolicy.\n\nSecurity updates:\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n* vm2: Sandbox Escape in vm2 (CVE-2022-36067)\n\nBug fix:\n\n* MCE 2.0.2 images (BZ# 2104569)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6422", "url": "https://access.redhat.com/errata/RHSA-2022:6422" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "2104569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104569" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2124794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124794" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6422.json" } ], "title": "Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.2 security and bug fixes", "tracking": { "current_release_date": "2024-12-18T00:36:29+00:00", "generator": { "date": "2024-12-18T00:36:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6422", "initial_release_date": "2022-09-12T21:10:32+00:00", "revision_history": [ { "date": "2022-09-12T21:10:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-12T21:10:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:36:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "multicluster engine for Kubernetes 2.0 for RHEL 8", "product": { "name": "multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:multicluster_engine:2.0::el8" } } } ], "category": "product_family", "name": "multicluster engine for Kubernetes" }, { "branches": [ { "category": "product_version", "name": "multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "product": { "name": "multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "product_id": "multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.0.2-10" } } }, { "category": "product_version", "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "product": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "product_identification_helper": { "purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "product": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "product": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "product_identification_helper": { "purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "product": { "name": "multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "product_id": "multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "product": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "product": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "product": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "product": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "product": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "product": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "product": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "product": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "product": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.0.2-13" } } }, { "category": "product_version", "name": "multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "product": { "name": "multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "product_id": "multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "product_identification_helper": { "purl": "pkg:oci/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.0.2-13" } } }, { "category": "product_version", "name": "multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "product": { "name": "multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "product_id": "multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "product": { "name": "multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "product_id": "multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "product_identification_helper": { "purl": "pkg:oci/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "product": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "product_identification_helper": { "purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "product": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "product_id": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "product_identification_helper": { "purl": "pkg:oci/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-deployment-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "product_id": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "product": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "product_identification_helper": { "purl": "pkg:oci/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "product": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "product": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "product": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "product_identification_helper": { "purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "product": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.0.2-8" } } }, { "category": "product_version", "name": "multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "product": { "name": "multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "product_id": "multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "product_identification_helper": { "purl": "pkg:oci/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "product": { "name": "multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "product_id": "multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "product_identification_helper": { "purl": "pkg:oci/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.0.2-29" } } }, { "category": "product_version", "name": "multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "product": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "product_id": "multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "product_identification_helper": { "purl": "pkg:oci/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "product": { "name": "multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "product_id": "multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "product": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "product": { "name": "multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "product_id": "multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "product": { "name": "multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "product_id": "multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x", "product": { "name": "multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x", "product_id": "multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.0.2-4" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "product": { "name": "multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "product_id": "multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.0.2-10" } } }, { "category": "product_version", "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "product": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "product_identification_helper": { "purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "product": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "product": { "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "product_id": "multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "product": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "product_id": "multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "product": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "product_id": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-reporter-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "product": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "product_identification_helper": { "purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "product": { "name": "multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "product_id": "multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "product": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "product": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "product": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "product": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "product": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "product": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "product": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "product": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "product": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.0.2-13" } } }, { "category": "product_version", "name": "multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "product": { "name": "multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "product_id": "multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "product_identification_helper": { "purl": "pkg:oci/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.0.2-13" } } }, { "category": "product_version", "name": "multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "product": { "name": "multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "product_id": "multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "product": { "name": "multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "product_id": "multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "product_identification_helper": { "purl": "pkg:oci/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "product": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "product_identification_helper": { "purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "product": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "product_id": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "product_identification_helper": { "purl": "pkg:oci/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-deployment-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "product_id": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "product": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "product_identification_helper": { "purl": "pkg:oci/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "product": { "name": "multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "product_id": "multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/klusterlet-operator-bundle\u0026tag=v2.0.2-22" } } }, { "category": "product_version", "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "product": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "product": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "product": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "product_identification_helper": { "purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "product": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.0.2-8" } } }, { "category": "product_version", "name": "multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "product": { "name": "multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "product_id": "multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "product_identification_helper": { "purl": "pkg:oci/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "product": { "name": "multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "product_id": "multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "product_identification_helper": { "purl": "pkg:oci/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.0.2-29" } } }, { "category": "product_version", "name": "multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "product": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "product_id": "multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "product_identification_helper": { "purl": "pkg:oci/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "product": { "name": "multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "product_id": "multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "product": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "product": { "name": "multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "product_id": "multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "product": { "name": "multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "product_id": "multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "product": { "name": "multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "product_id": "multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.0.2-4" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "product": { "name": "multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "product_id": "multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.0.2-10" } } }, { "category": "product_version", "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "product": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "product": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "product": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "product_id": "multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "product": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "product_id": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-reporter-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "product": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "product": { "name": "multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "product_id": "multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "product": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "product": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "product": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "product": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "product": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "product": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "product": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "product": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "product": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.0.2-13" } } }, { "category": "product_version", "name": "multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "product": { "name": "multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "product_id": "multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.0.2-13" } } }, { "category": "product_version", "name": "multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "product": { "name": "multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "product_id": "multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "product": { "name": "multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "product_id": "multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "product": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "product": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "product_id": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "product_identification_helper": { "purl": "pkg:oci/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-deployment-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "product_id": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "product": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "product": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "product": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "product": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "product": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.0.2-8" } } }, { "category": "product_version", "name": "multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "product": { "name": "multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "product_id": "multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "product": { "name": "multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "product_id": "multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.0.2-29" } } }, { "category": "product_version", "name": "multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "product": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "product_id": "multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "product_identification_helper": { "purl": "pkg:oci/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "product": { "name": "multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "product_id": "multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "product": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "product": { "name": "multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "product_id": "multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "product": { "name": "multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "product_id": "multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "product": { "name": "multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "product_id": "multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.0.2-4" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "product": { "name": "multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "product_id": "multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/agent-service-rhel8\u0026tag=v2.0.2-10" } } }, { "category": "product_version", "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "product": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "product_id": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "product_identification_helper": { "purl": "pkg:oci/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "product": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "product_id": "multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-image-service-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "product": { "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "product_id": "multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "product": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "product_id": "multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "product": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "product_id": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/assisted-installer-reporter-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "product": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "product_id": "multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "product_identification_helper": { "purl": "pkg:oci/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "product": { "name": "multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "product_id": "multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "product": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "product_id": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "product": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "product_id": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "product": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "product_id": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "product": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "product_id": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "product": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "product_id": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "product": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "product_id": "multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "product": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "product_id": "multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "product": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "product_id": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "product": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "product_id": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-console-mce-rhel8\u0026tag=v2.0.2-13" } } }, { "category": "product_version", "name": "multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "product": { "name": "multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "product_id": "multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "product_identification_helper": { "purl": "pkg:oci/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/console-mce-rhel8\u0026tag=v2.0.2-13" } } }, { "category": "product_version", "name": "multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "product": { "name": "multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "product_id": "multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/discovery-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "product": { "name": "multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "product_id": "multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "product_identification_helper": { "purl": "pkg:oci/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hive-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "product_id": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "product": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "product_id": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "product_identification_helper": { "purl": "pkg:oci/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "product": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "product_id": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "product_identification_helper": { "purl": "pkg:oci/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-deployment-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "product": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "product_id": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "product": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "product_id": "multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "product_identification_helper": { "purl": "pkg:oci/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/hypershift-rhel8-operator\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "product": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "product_id": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8\u0026tag=v2.0.2-6" } } }, { "category": "product_version", "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "product": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "product_id": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "product": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "product_id": "multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "product_identification_helper": { "purl": "pkg:oci/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "product": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "product_id": "multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/multicloud-manager-rhel8\u0026tag=v2.0.2-8" } } }, { "category": "product_version", "name": "multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "product": { "name": "multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "product_id": "multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "product_identification_helper": { "purl": "pkg:oci/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/must-gather-rhel8\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "product": { "name": "multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "product_id": "multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "product_identification_helper": { "purl": "pkg:oci/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/mce-operator-bundle\u0026tag=v2.0.2-29" } } }, { "category": "product_version", "name": "multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "product": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "product_id": "multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "product_identification_helper": { "purl": "pkg:oci/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/backplane-rhel8-operator\u0026tag=v2.0.2-7" } } }, { "category": "product_version", "name": "multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "product": { "name": "multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "product_id": "multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/placement-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "product": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "product_id": "multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8\u0026tag=v2.0.2-5" } } }, { "category": "product_version", "name": "multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "product": { "name": "multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "product_id": "multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "product": { "name": "multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "product_id": "multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "product_identification_helper": { "purl": "pkg:oci/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/registration-operator-rhel8\u0026tag=v2.0.2-4" } } }, { "category": "product_version", "name": "multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "product": { "name": "multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "product_id": "multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine/work-rhel8\u0026tag=v2.0.2-4" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x" }, "product_reference": "multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64" }, "product_reference": "multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64" }, "product_reference": "multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le" }, "product_reference": "multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le" }, "product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x" }, "product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64" }, "product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64" }, "product_reference": "multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le" }, "product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64" }, "product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64" }, "product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x" }, "product_reference": "multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64" }, "product_reference": "multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64" }, "product_reference": "multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le" }, "product_reference": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64" }, "product_reference": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64" }, "product_reference": "multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64" }, "product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64" }, "product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le" }, "product_reference": "multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le" }, "product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64" }, "product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x" }, "product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64" }, "product_reference": "multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le" }, "product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64" }, "product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x" }, "product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64" }, "product_reference": "multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le" }, "product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64" }, "product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64" }, "product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x" }, "product_reference": "multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64" }, "product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64" }, "product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x" }, "product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le" }, "product_reference": "multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64" }, "product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x" }, "product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64" }, "product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le" }, "product_reference": "multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64" }, "product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le" }, "product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x" }, "product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64" }, "product_reference": "multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le" }, "product_reference": "multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64" }, "product_reference": "multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64" }, "product_reference": "multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x" }, "product_reference": "multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64" }, "product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64" }, "product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x" }, "product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le" }, "product_reference": "multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x" }, "product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le" }, "product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64" }, "product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64" }, "product_reference": "multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64" }, "product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le" }, "product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x" }, "product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64" }, "product_reference": "multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le" }, "product_reference": "multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64" }, "product_reference": "multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64" }, "product_reference": "multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x" }, "product_reference": "multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64" }, "product_reference": "multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le" }, "product_reference": "multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x" }, "product_reference": "multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64" }, "product_reference": "multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64" }, "product_reference": "multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64" }, "product_reference": "multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le" }, "product_reference": "multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x" }, "product_reference": "multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64" }, "product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le" }, "product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64" }, "product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x" }, "product_reference": "multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64" }, "product_reference": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x" }, "product_reference": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64" }, "product_reference": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le" }, "product_reference": "multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le" }, "product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64" }, "product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x" }, "product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64" }, "product_reference": "multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64" }, "product_reference": "multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x" }, "product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64" }, "product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64" }, "product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le" }, "product_reference": "multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le" }, "product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x" }, "product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64" }, "product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64" }, "product_reference": "multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le" }, "product_reference": "multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x" }, "product_reference": "multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64" }, "product_reference": "multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64" }, "product_reference": "multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le" }, "product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64" }, "product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x" }, "product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64" }, "product_reference": "multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le" }, "product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64" }, "product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64" }, "product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x" }, "product_reference": "multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le" }, "product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64" }, "product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64" }, "product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x" }, "product_reference": "multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le" }, "product_reference": "multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x" }, "product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64" }, "product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64" }, "product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le" }, "product_reference": "multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64" }, "product_reference": "multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64" }, "product_reference": "multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x" }, "product_reference": "multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le" }, "product_reference": "multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x" }, "product_reference": "multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64" }, "product_reference": "multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le" }, "product_reference": "multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64" }, "product_reference": "multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le" }, "product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64" }, "product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64" }, "product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x" }, "product_reference": "multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64" }, "product_reference": "multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64" }, "product_reference": "multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x" }, "product_reference": "multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le" }, "product_reference": "multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64" }, "product_reference": "multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le" }, "product_reference": "multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x" }, "product_reference": "multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64" }, "product_reference": "multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64" }, "product_reference": "multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le" }, "product_reference": "multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64 as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64" }, "product_reference": "multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "relates_to_product_reference": "8Base-multicluster-engine-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x as a component of multicluster engine for Kubernetes 2.0 for RHEL 8", "product_id": "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x" }, "product_reference": "multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x", "relates_to_product_reference": "8Base-multicluster-engine-2.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-12T21:10:32+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/multicluster_engine/index#installing-while-connected-online", "product_ids": [ "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6422" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-36067", "cwe": { "id": "CWE-913", "name": "Improper Control of Dynamically-Managed Code Resources" }, "discovery_date": "2022-09-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124794" } ], "notes": [ { "category": "description", "text": "A flaw was found in the vm2 sandbox when running untrusted code, as the sandbox setup does not manage proper exception handling. This flaw allows an attacker to bypass the sandbox protections and gain remote code execution on the hypervisor host or the host which is running the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "vm2: Sandbox Escape in vm2", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36067" }, { "category": "external", "summary": "RHBZ#2124794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36067", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36067" }, { "category": "external", "summary": "https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq", "url": "https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq" } ], "release_date": "2022-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-12T21:10:32+00:00", "details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/multicluster_engine/index#installing-while-connected-online", "product_ids": [ "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6422" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:1594a65737793fb790c7cd3b034c0ffa88106e2020d4826a6931f853430c28b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:3a69e4ccd7e9fcbf75aa8511da30f4c948ff2c8ebcb9c8fc216fe6d9243a06e2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:824ab7d7ef413789ad3d443237bc7e797ad9098a5f86c11ea4b12db42728344d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/agent-service-rhel8@sha256:897dea5f15747a7956ccec476b66610de25c8d346064b4cc57dc7d8282ea1cb0_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:3c9407b09f0ac59a617a61b850b75271b1d0a917a516f81635989965149a1e5b_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6b14352a9ce766be2ac7012db5cf78e7f2758182d9c207f36faed3645f68b441_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:6e9778293949c53f779f1a249b13c1ec2a200c27cf84e86d7ac16e88085651a5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/apiserver-network-proxy-rhel8@sha256:fa035a841a68e0ef06e2913a2ca1637681ceebf57e3e5fe4dd02630f741bfdfd_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:60928fed51b56e78ae2b5711a5a3592a73e7fe472b847e4886173462b9122795_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:64653bebafbf622e94fc86e22c4bd78f30210600be80aba9c3c1db12b34d31ad_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:6dffc20353fdba966bf939cb9f75f540f08890eb4aa1a30b50f4484ae96466c5_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-image-service-rhel8@sha256:862da080ee97741d00b1ef8a68f6c2d677b38ce55135c68525fada5638c177ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:5e77a879b0046e8345abc81fc0ccb3e6ac5f25be187a21616e078a09143ff83b_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-agent-rhel8@sha256:f7094431b53986fd489e9222d74a712b799fbdf12b19ff315199d44e1dc5fc62_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:34613f3adf2eca8e43d1d8e83c0268e2759da125c370ddc395f5fcc8ebd991ec_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:5ad301fb287917b2d8bef9b097361d2e3c2ab902829c4834de4803f7ae0bba5f_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-reporter-rhel8@sha256:eaa948917ee410768d443bffa00d31b64355e873d392e3c18154cfe0bdba2538_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:71e2abb8cb1edeb810780493216bdb4bc66be07e3649e0c098368610abda56ea_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:8306c0022b9f0dc8439e8a65fde641c65ac75a77a0ff92566a98fb1fc0a14cb2_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/assisted-installer-rhel8@sha256:c07291f97cc591cc822d432db50e2e24c0ff91ebf539fcda6abefa66b66f0227_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:0c848dff350580a2924354e61b3e1c544dfdc12a3052103dfcc4d3a9cc65006f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:8e29980f687abbcf4feb43e45d94462a0cfeccb1b7a94f3622728944e9a14393_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:9f610cfbb173f65e8729448ea84f28c4b49c1fcdd7cc5492aede1df5f02743bf_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/aws-encryption-provider-rhel8@sha256:f1eb4646ba47f0884476a9918f41bfa621596b3a1902cfb2d0adde816b639876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2261f4dd6d131ab238abdda7b63ae49b25b735252e240e236ad266a1a7c81171_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:2de9509205008cc97030188becdee79de44c0cb297497cf9b55f5a419f7207ab_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:77bef36732e8b907df8203db4ca35e8e3d826dd7f22d29c24b7acf5a657047ea_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/backplane-rhel8-operator@sha256:9f746676a50e6b21b12eef9d715b99cb698abc83b551cf9f65775badac87b882_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:1fd85d0728eddfb646d0df7687afbb723dba0757c8c0b13652ca70500f9113cc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:6f8f8783e3a8384a432a12b3c0586b69e2fbac8a996ecb19e2fd1582b9f45d94_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:a6f4d715cdd4bfb6379b866badb78fc655a3d1c7cbd751c1fb533fa2ab879dab_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-aws-rhel8@sha256:ba3c1440fa8cbe8995f91b31f7de890e46c1d1d9aaea2bd17fbe55ba31b697b4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:0f7a2ea57493d8387b1bf318cb577aad203d175992a17a8e80940db92977f8f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:3d8e4d3e410410a42d401579a75bce2118751712da17d264c3e6702f341ae7dd_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:6f704ee4c5ede00f3f1379a6920f37d684bb2ba05bc12ac860b286feae5ea947_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-azure-rhel8@sha256:fccbca34909c3f283afd9c60e85e465f43280bf079f03b8a977484f9f804b05d_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:8eeac368170700768c4662a226275ab66dd803eb34029214009856867ca71126_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:92cbe1cbff4518d992391ca671d0181f186d69543299de18b8a8c08caac0d3ef_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e413d0a4c2aa419dce33cb9d58c08c4a7c823d0d9271a9266f22c8f94cb22275_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-provider-kubevirt-rhel8@sha256:e995e09d919feb3cd11d5ceea0a631ae80d929d853fc5a14567cf48c14f99558_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:00e856bc1c5223e3e1fb2ebb6ac7368fa65c86733baba7238cb64ee3f8184c56_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:d9ec930d182382107bfc9d6678048e7d3d83989903c2886985f13899a413942a_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:e7f7c089957c3bbcd1ecbe145b5d3da8cfc322a738795d7428e55f6f28d03ca4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-api-rhel8@sha256:fe8ba28e0f336a13468c6442502846148049c36a5074d6d0eebf20f85b5d5488_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:2837c0d42b38ea9bc43cf4a3656270ec362290932fcbf55c54ffb0ca3fc98ac6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:404bdfa3535de2e7e9bec6086e27fb6fe6446993c2ef67b37ca37dbc91670fc4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:787fb2c95b44b2d6b4b0d555f3e3b3fe8421a3e8357290ed306274fbe52e40b9_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/cluster-curator-controller-rhel8@sha256:b2c20a908779d4c3228de5c59ab0a74f2093e5ec1d2d8ebf6546807981af69e1_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:2ed3ff205f0b03de0f72a609c82606b92d9e96f441bc55b8218bbea84d50d7e0_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:909ed1f9d99194dba085e90c7c08543f8dfa1ea644dd658734bc415934946a47_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:9ba0fd332395a56beccdccbbb80b0685ed33723c47378421a7c786b68bfaa476_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterclaims-controller-rhel8@sha256:b4de22c18357aed520ccbcdd82762b7eb18bc0ff46ecb4a8c2563400aed870d1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:0021f5029c41e8f387d4a20b23dfa5d8e1618691ee7362a7d16a261b13eafa90_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:3d31a4023236eef23488a1603886599475a3a22784885681904c310ea4926683_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:9e0a4d83250d3545d2109fb78b596e268bd8b8d64e15b39ce848f744301ebfe2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/clusterlifecycle-state-metrics-rhel8@sha256:cb311ec3c06ca38ed394a433243fabf31df8b91bbd9b88b871bb8c18b79d5f97_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:06c79732317fefe3c827bb2650f212954134c6ed3ada78168629d63608e2e11d_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:0f3fbbd940f40b7bd32f0cd41a07ad71b19f186abdea5ff2de1aaa415a66c25f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:98639c1ae344ffcf95c599d8312275504db94d70d0f32ef0a7c47d1aee077a47_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/discovery-rhel8@sha256:d4857a7bad664b8a41e3552e86d3fcc59f20cd2dd5c9eb328a549d9c996395f3_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:3c1d2e5b570a657019999ab4f852903ceed1030e75349a4ba8cb347fe59a46fd_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:b122bb3cd48fbc0dfd94dfa241f858e312ec40257d96db78bd0ba4541d5f3b1f_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff11bc81cf3b428990ab3095a9d496bb71a6575feeb667bc9f00e19ec946022e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hive-rhel8@sha256:ff12dd20b4d67fe54c55cfe2da8a40cdc5ce0c05071c98b8766cf7ce17a669eb_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:4218e9d934ca3994d0f2bfdcd4dfa1068db07028384f952327dd1159538740a8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:5f63d68b44651f90bd41f52eccdc9669f0cfd03160c332682976f7713d58abed_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:dcdbff32e7dd1d2dbe4c9c327bb0047a376bfb0701b5c35378dfc1171b70c4d4_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/hypershift-rhel8-operator@sha256:deb36681f5c6bd0b610728972d9c89c3c8600d8263946e20920be3daccbcb2d4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/klusterlet-operator-bundle@sha256:6e44a0a56f17c9f3385678a25110abffc955b16d21fca444554cf40fce1b5260_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:21b5a0fa242f59b72f561c0e5f5d617130632fa290b5821571d0295741114108_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:a6c2d71d5c3320454173eb4cc399ea408b0308e7238e7e814d35371fe0ea973a_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:bba271d5402e79a23880a2812be1d6c766f2e0595e92815c3b2535e206ab583c_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/managedcluster-import-controller-rhel8@sha256:cdf9c4ccad50c659c35547f18e3c36e1aef587cfc3bc5a1256f7728579cbdf39_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:0a05f1bd309aceb7337cf678c60afa6b0946ff1c74274712171546d01d0e3f8e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:5d28281c88b4e5aced0b51ea20d334113af2147b7354a6ca3b9a5e690f6ab3db_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:c3eed867047047babb42c7dfe7a2c173fffd78f3ad539ab138321d180bce1785_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/mce-operator-bundle@sha256:cf2f952074acb5005f6ef1c191ddc9a70f08a4565c442967f48a7c42bf171101_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:0508204db1a9ea3da9823c0ed18d61a96616d1c187c5ce1300ae0c6568f9a5ae_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:8366adf258f96661ad29d54181df3caf5b0a4eed0714db4716650e4d128df1fc_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:bac599e9f84a542c2d741ca5d411390f5799abebcb1f2c8f96ea7c01b879e58d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicloud-manager-rhel8@sha256:f8857dcf838174f78626cb96e1e44ae3b34a707f19885c48371e19fcc84ad398_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:2c0c4c096a00a7c928db66418550a11a714e573d1aea6236304557aee65414b9_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:5ceb9955befd5ee7d66d842d3d8338df2da71e091c8a4bcbd2f42d458cf677b6_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:8453bb4e1630cce502e731b2575543b4a8bfc9d702af2ba71a3e62f766e412d7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-cluster-api-provider-agent-rhel8@sha256:cbf6efdc6070ba43928a05efa7cc65f8c024064ab91b28e8c7b533a9c6cebd5d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:2463e0e4c6c22c1e86059e3e931eb845981bac349795d027a482fde9c181f7f8_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:40efd9e8d659da4dc287c0bf1c42d0f46f31a45993ebb3839fcc8320a17399aa_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:43198ec672d6384a1c45f32b7746aeb3e92509d2b41c4e5fa61168c2b25d2c47_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-console-mce-rhel8@sha256:decfadba7a52431fd2c951aab6bcd05113a3d3f431cad060fa3d55327c026e03_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:21f70a8d5147e91a1af1f4f685af5bc564577b87dd650d484707e79183efaea0_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:431d27251d2c358a7a49af9b70cc6a0281041448bc631555d1332c250786798f_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:99f9e0d91afb71a24045c0614fd7c59ae7bd8380585ce12e010f58647a9d7190_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-addon-rhel8-operator@sha256:c59d0c83e6daaaecb97da8259f94d231e3153f00fcda279d952e9e278152bb39_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:06a0d1811690f909d96d4fd6cfb995e691866bd04ab022bc614ec1c580b0f128_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:6f0b553a37c08074920f3b72fb81d8e1c25dfe186974da385061b1647706f65d_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a914a9e5c0b3a428f31fe639364c5708b4e83c78209f0e1acfad40ae4c9458f7_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-hypershift-deployment-controller-rhel8@sha256:a98976610f7c6f051d4f9b92742494ceb0ab6d1ced5fa76a1356e4cdcdd11007_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:2b6728da086223e1aa65b0d8aa8d95f2dd1b1f899e5217c380dcea38cf806660_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:453e79027b772c68d8c5f6d806f9dd053ef56aacf87c3d981462ac93b2009474_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:61477b15898647f6e49dd9964bfca89c44fc0e122b176b48843c2684a75594e4_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/multicluster-engine-managed-serviceaccount-rhel8@sha256:d1ca2fd6f307c7762c83a06396471a3864bfe73044483ad6a23067e5607898e4_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:2481f12c170254bd64176633e11adc92dafdce0cf9fe3335ee031f1ac4185f21_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:df3c12deab40109a3862c4365126a827ec4b9ee32abd70d76812f14a85df975d_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f76e86372aef1e967c33577565c273978b3c88df991e544bcc0de556bc92930c_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/must-gather-rhel8@sha256:f7b7081b1f3b2a8958e774cb3000c098853875f6d9e1fc57fbe6243212d1d8c2_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:2e4497900238d22125d4c968704ad9855d4a3141a46b66876d3ea4a265c0a47b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:c5bb1efa0d8a4aaec3bcd657891480e729ea8c7f6ebc53ed26daf2bb3ddceca1_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:e52e244f645a911ad4fce21719304e862ad69a2f89fd11725334b695c32dd16e_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/placement-rhel8@sha256:f5ea87455a1a1e1adc662dacd4b922499b290fd82550a7e9d4828b0fd26b36a6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0229235666013c5072d60f92fd76624b4cf3a5068ba9cc797da6e2d9939960d6_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:0c07e61aecdee9e54657ab082a64770bbe91fb0cd9e7df8d6af9fa68e60eecc6_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:94ace912667a63ca9ee1beafc8ade0a1685d3098255782634b59a70745be600a_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/provider-credential-controller-rhel8@sha256:e12683fb75dbbaa67d65eeaffd2f2688e39443fb6b40a1dd69a46fda8cf3f0c2_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:11bb3b6e660400944ac21a330a9ce95692ec4d930b1ce262e17cd2615f2f8dac_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:5041604c38f8f562e44fd05b9b3cd144a804a44b15c49e7b5b16cc84a8cb8ba2_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:a93545e7d2932f05bb0d447034abb6ab963566282ef18207a53cf96bb2e6118b_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-operator-rhel8@sha256:f066b874e5d221be6722d5ddd1ed4f62b59f5cd2cda7c0a84c916f9fe23c1949_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:0a186a10e370f0c26db50e53048afa243f2f48844b1aade5e6190456b5046876_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:1ed6f9014c12f800b7d8e1de30529787cb79949f0e929aa3023da5aa97b57478_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:548864385439da26844112af93ea08a5a54c9b34a1ce2309cc65673c6d9adcc7_s390x", "8Base-multicluster-engine-2.0:multicluster-engine/registration-rhel8@sha256:67fca273f668983a096ea1f3a54e45f7a4b86fd07e8d08b250d5498f39180d84_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:1b5d82b60f9b12c7221954e0507e218d45f8e7b0fd1905fd61ad470ccbaf5469_amd64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:586f6748be38454975c199f40a1bfcd7d21a359efa208ff22ada8c5333067b81_ppc64le", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:8c63504ced9a5f8b3d125bd3e5074f52dba7b6105b0cb12d8be629203727a683_arm64", "8Base-multicluster-engine-2.0:multicluster-engine/work-rhel8@sha256:d153be54dbd6c77e1494ae1e9f2a7d73c3d3d2e4437f68ae1650e79168dd9861_s390x" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "vm2: Sandbox Escape in vm2" } ] }
rhsa-2023_1049
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.2 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n* keycloak: XSS on impersonation under specific circumstances (CVE-2022-1438)\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n* keycloak: missing email notification template allowlist (CVE-2022-1274)\n* keycloak: minimist: prototype pollution (CVE-2021-44906)\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n* undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations (CVE-2022-2764)\n* snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)\n* loader-utils: loader-utils:Regular expression denial of service (CVE-2022-37603)\n* keycloak: Session takeover with OIDC offline refreshtokens (CVE-2022-3916)\n* keycloak: path traversal via double URL encoding (CVE-2022-3782)\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode (CVE-2022-38749)\n* snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match (CVE-2022-38751)\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject (CVE-2022-38750)\n* keycloak: Client Registration endpoint does not check token revocation (CVE-2023-0091)\n* keycloak: glob-parent: Regular Expression Denial of Service (CVE-2021-35065)\n* json5: Prototype Pollution in JSON5 via Parse Method (CVE-2022-46175)\n* keycloak: keycloak: user impersonation via stolen uuid code (CVE-2023-0264)\n* snakeyaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n* CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)\n* rcue-bootstrap: bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)\n* jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)\n* sshd-common: mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)\n* jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)\n* jettison: parser crash by stackoverflow (CVE-2022-40149)\n* jackson-databind: use of deeply nested arrays (CVE-2022-42004)\n* jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)\n* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)\n* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)\n* jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)\n* CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363)\n* keycloak: reflected XSS attack (CVE-2022-4137)\n* Keycloak Node.js Adapter: Open redirect vulnerability in checkSSO (CVE-2022-2237)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1049", "url": "https://access.redhat.com/errata/RHSA-2023:1049" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1601614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601614" }, { "category": "external", "summary": "1601617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601617" }, { "category": "external", "summary": "1701972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" }, { "category": "external", "summary": "1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "2031904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031904" }, { "category": "external", "summary": "2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2073157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "category": "external", "summary": "2097007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097007" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" }, { "category": "external", "summary": "2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "2129707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129707" }, { "category": "external", "summary": "2129709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129709" }, { "category": "external", "summary": "2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "2135770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135770" }, { "category": "external", "summary": "2135771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771" }, { "category": "external", "summary": "2138971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971" }, { "category": "external", "summary": "2140597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140597" }, { "category": "external", "summary": "2141404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141404" }, { "category": "external", "summary": "2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "2148496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148496" }, { "category": "external", "summary": "2150009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009" }, { "category": "external", "summary": "2155681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155681" }, { "category": "external", "summary": "2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "2155970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155970" }, { "category": "external", "summary": "2156263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263" }, { "category": "external", "summary": "2156324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324" }, { "category": "external", "summary": "2158585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158585" }, { "category": "external", "summary": "2160585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160585" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1049.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update", "tracking": { "current_release_date": "2024-12-18T00:38:25+00:00", "generator": { "date": "2024-12-18T00:38:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:1049", "initial_release_date": "2023-03-01T21:58:17+00:00", "revision_history": [ { "date": "2023-03-01T21:58:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-03-01T21:58:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:38:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7", "product": { "name": "Red Hat Single Sign-On 7", "product_id": "Red Hat Single Sign-On 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14040", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601614" } ], "notes": [ { "category": "description", "text": "In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6.2 and newer versions don\u0027t use the bootstrap library, hence are not affected by this flaw.\n\nRed Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.\n\nRed Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14040" }, { "category": "external", "summary": "RHBZ#1601614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601614" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14040" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute" }, { "cve": "CVE-2018-14042", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601617" } ], "notes": [ { "category": "description", "text": "In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6.2 and newer versions don\u0027t use the bootstrap library, hence are not affected by this flaw.\n\nRed Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.\n\nRed Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14042" }, { "category": "external", "summary": "RHBZ#1601617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601617" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14042", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14042" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14042", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14042" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip" }, { "cve": "CVE-2019-11358", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1701972" } ], "notes": [ { "category": "description", "text": "A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modifying objects up the prototype chain, including the global Object. A crafted JSON object passed to a vulnerable method could lead to denial of service or data injection, with various consequences.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Virtualization 4.2 EUS contains the affected version of bootstrap in the packages ovirt-js-dependencies and ovirt-engine-dashboard. These packages are deprecated in Red Hat Virtualization 4.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11358" }, { "category": "external", "summary": "RHBZ#1701972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11358", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358" }, { "category": "external", "summary": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/", "url": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/" }, { "category": "external", "summary": "https://www.drupal.org/sa-core-2019-006", "url": "https://www.drupal.org/sa-core-2019-006" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection" }, { "cve": "CVE-2020-11022", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828406" } ], "notes": [ { "category": "description", "text": "A Cross-site scripting (XSS) vulnerability exists in JQuery. This flaw allows an attacker with the ability to supply input to the \u2018HTML\u2019 function to inject Javascript into the page where that input is rendered, and have it delivered by the browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method", "title": "Vulnerability summary" }, { "category": "other", "text": "No supported release of Red Hat OpenStack Platform is affected by this vulnerability as no shipped packages contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11022" }, { "category": "external", "summary": "RHBZ#1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11022", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2" } ], "release_date": "2020-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method" }, { "cve": "CVE-2020-11023", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1850004" } ], "notes": [ { "category": "description", "text": "A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery\u0027s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux versions 6, 7, and 8 ship a vulnerable version of JQuery in the `pcs` component. However, the vulnerability has not been found to be exploitable in reasonable scenarios. \n\nIn RHEL7, pcs-0.9.169-3.el7_9.3 [RHSA-2022:7343] contains an updated version of jquery (3.6.0), which does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11023" }, { "category": "external", "summary": "RHBZ#1850004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023" }, { "category": "external", "summary": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/", "url": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" } ], "release_date": "2020-04-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods" }, { "cve": "CVE-2021-35065", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156324" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "glob-parent: Regular Expression Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The glob-parent package is a transitive dependency and this is not used directly in any of the Red Hat products. Hence, the impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-35065" }, { "category": "external", "summary": "RHBZ#2156324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-35065", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294", "url": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294" } ], "release_date": "2022-12-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glob-parent: Regular Expression Denial of Service" }, { "cve": "CVE-2021-44906", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2066009" } ], "notes": [ { "category": "description", "text": "An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker to trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "minimist: prototype pollution", "title": "Vulnerability summary" }, { "category": "other", "text": "The original fix for CVE-2020-7598 was incomplete as it was still possible to bypass in some cases. While this flaw (CVE-2021-44906) enables attackers to control objects that they should not have access to, actual exploitation would still require a chain of independent flaws. Even though the CVSS for CVE-2021-44906 is higher than CVE-2020-7598, they are both rated as having Moderate impact.\n\nWithin Red Hat Satellite 6 this flaw has been rated as having a security impact of Low. It is not currently planned to be addressed there, as the minimist library is only included in the -doc subpackage and is part of test fixtures that are not in the execution path used by the rabl gem.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44906" }, { "category": "external", "summary": "RHBZ#2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-xvch-5gv4-984h", "url": "https://github.com/advisories/GHSA-xvch-5gv4-984h" } ], "release_date": "2022-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "minimist: prototype pollution" }, { "acknowledgments": [ { "names": [ "Marcus Nilsson" ], "organization": "usd AG" } ], "cve": "CVE-2022-1274", "cwe": { "id": "CWE-80", "name": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)" }, "discovery_date": "2022-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073157" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: HTML injection in execute-actions-email Admin REST API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1274" }, { "category": "external", "summary": "RHBZ#2073157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1274", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725" } ], "release_date": "2023-02-28T18:57:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: HTML injection in execute-actions-email Admin REST API" }, { "acknowledgments": [ { "names": [ "Grzegorz Tworek" ], "organization": "SISOFT s.c." } ], "cve": "CVE-2022-1438", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031904" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. Under specific circumstances, HTML entities are not sanitized during user impersonation, resulting in a Cross-site scripting (XSS) vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: XSS on impersonation under specific circumstances", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1438" }, { "category": "external", "summary": "RHBZ#2031904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1438", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1438" } ], "release_date": "2023-02-28T18:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: XSS on impersonation under specific circumstances" }, { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2150009" } ], "notes": [ { "category": "description", "text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).", "title": "Vulnerability description" }, { "category": "summary", "text": "SnakeYaml: Constructor Deserialization Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1471" }, { "category": "external", "summary": "RHBZ#2150009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2", "url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2" } ], "release_date": "2022-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "SnakeYaml: Constructor Deserialization Remote Code Execution" }, { "acknowledgments": [ { "names": [ "Ayta\u00e7 Kal\u0131nc\u0131", "Ilker Bulgurcu", "Yasin Y\u0131lmaz" ], "organization": "NETA\u015e PENTEST TEAM" } ], "cve": "CVE-2022-2237", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2097007" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Keycloak Node.js Adapter. This flaw allows an attacker to benefit from an Open Redirect vulnerability in the checkSso function.", "title": "Vulnerability description" }, { "category": "summary", "text": "Adapter: Open redirect vulnerability in checkSSO", "title": "Vulnerability summary" }, { "category": "other", "text": "CodeReady Studio is no longer supported. Therefore, this flaw will not be addressed in CodeReady Studio. Please see https://developers.redhat.com/articles/2022/04/18/announcement-red-hat-codeready-studio-reaches-end-life for more information.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2237" }, { "category": "external", "summary": "RHBZ#2097007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097007" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2237", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2237" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2237", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2237" } ], "release_date": "2023-03-01T13:57:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Adapter: Open redirect vulnerability in checkSSO" }, { "cve": "CVE-2022-2764", "discovery_date": "2022-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2117506" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow with EJB invocations. This flaw allows an attacker to generate a valid HTTP request and send it to the server on an established connection after removing the LAST_CHUNK from the bytes, causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2764" }, { "category": "external", "summary": "RHBZ#2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2764" } ], "release_date": "2022-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations" }, { "cve": "CVE-2022-3782", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2138971" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: path traversal via double URL encoding", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not impacted as this CVE affects the server-side Keycloak execution but Quarkus only acts as a Keycloak client in its quarkus-keycloak-authorization extension. For this reason Quarkus is marked with Low impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3782" }, { "category": "external", "summary": "RHBZ#2138971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3782", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782" } ], "release_date": "2022-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: path traversal via double URL encoding" }, { "acknowledgments": [ { "names": [ "Peter Flintholm" ], "organization": "Trifork" } ], "cve": "CVE-2022-3916", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2022-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141404" } ], "notes": [ { "category": "description", "text": "A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: Session takeover with OIDC offline refreshtokens", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3916" }, { "category": "external", "summary": "RHBZ#2141404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3916" } ], "release_date": "2022-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: Session takeover with OIDC offline refreshtokens" }, { "cve": "CVE-2022-4137", "cwe": { "id": "CWE-81", "name": "Improper Neutralization of Script in an Error Message Web Page" }, "discovery_date": "2022-11-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2148496" } ], "notes": [ { "category": "description", "text": "A reflected cross-site scripting (XSS) vulnerability was found in the \u0027oob\u0027 OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: reflected XSS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4137" }, { "category": "external", "summary": "RHBZ#2148496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4137", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137" } ], "release_date": "2023-03-01T13:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: reflected XSS attack" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "Red Hat Single Sign-On 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-25857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126789" } ], "notes": [ { "category": "description", "text": "A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Denial of Service due to missing nested depth limitation for collections", "title": "Vulnerability summary" }, { "category": "other", "text": "For RHEL-8 it\u0027s downgraded to moderate because \"snakeyaml\" itself in RHEL 8 or RHEL-9 isn\u0027t shipped and \"prometheus-jmx-exporter\" is needed as build dependency. And it\u0027s not directly exploitable, hence severity marked as moderate.\nRed Hat Integration and AMQ products are not vulnerable to this flaw, so their severity has been lowered to moderate.\nRed Hat Single Sign-On uses snakeyaml from liquibase-core and is only used when performing migrations and would require administrator privileges to execute, hence severity marked as Low.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be present soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25857" }, { "category": "external", "summary": "RHBZ#2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25857", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857" }, { "category": "external", "summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525" } ], "release_date": "2022-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "snakeyaml: Denial of Service due to missing nested depth limitation for collections" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-37603", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140597" } ], "notes": [ { "category": "description", "text": "A flaw was found in loader-utils webpack library. When the url variable from interpolateName is set, the prototype can be polluted. This issue could lead to a regular expression Denial of Service (ReDoS), affecting the availability of the affected component.", "title": "Vulnerability description" }, { "category": "summary", "text": "loader-utils: Regular expression denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-37603" }, { "category": "external", "summary": "RHBZ#2140597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140597" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-37603", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-37603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37603" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "loader-utils: Regular expression denial of service" }, { "cve": "CVE-2022-38749", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129706" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38749" }, { "category": "external", "summary": "RHBZ#2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38749", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode" }, { "cve": "CVE-2022-38750", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129707" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38750" }, { "category": "external", "summary": "RHBZ#2129707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129707" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38750", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38750" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject" }, { "cve": "CVE-2022-38751", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129709" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38751" }, { "category": "external", "summary": "RHBZ#2129709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38751", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38751" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38751", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38751" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match" }, { "cve": "CVE-2022-40149", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135771" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. This flaw allows an attacker to supply content that causes the parser to crash by writing outside the memory bounds if the parser is running on user-supplied input, resulting in a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: parser crash by stackoverflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40149" }, { "category": "external", "summary": "RHBZ#2135771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149" }, { "category": "external", "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1", "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: parser crash by stackoverflow" }, { "cve": "CVE-2022-40150", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135770" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. If the parser is running on user-supplied input, an attacker may supply content that causes the parser to crash, causing memory exhaustion. This effect may support a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: memory exhaustion via user-supplied XML or JSON data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40150" }, { "category": "external", "summary": "RHBZ#2135770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40150", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40150" }, { "category": "external", "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1", "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jettison: memory exhaustion via user-supplied XML or JSON data" }, { "cve": "CVE-2022-42003", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135244" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled due to unchecked primitive value deserializers to avoid deep wrapper array nesting.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42003" }, { "category": "external", "summary": "RHBZ#2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS" }, { "cve": "CVE-2022-42004", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135247" } ], "notes": [ { "category": "description", "text": "A flaw was found In FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion due to the lack of a check in BeanDeserializer._deserializeFromArray to prevent the use of deeply nested arrays. An application is only vulnerable with certain customized choices for deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: use of deeply nested arrays", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42004" }, { "category": "external", "summary": "RHBZ#2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42004", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: use of deeply nested arrays" }, { "cve": "CVE-2022-45047", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2145194" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache MINA SSHD, when using Java deserialization to load a serialized java.security.PrivateKey. An attacker could benefit from unsafe deserialization by inserting unsecured data that may affect the application or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "mina-sshd: Java unsafe deserialization vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Impact as High as there\u0027s a mitigation for minimizing the impact which the flaw requires org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to be impacted, which would require an external/public API for an attacker to benefit from it. \n\nRed Hat Fuse 7 and Red Hat JBoss Enterprise Application Platform 7 have a lower rate (moderate) as it\u0027s very unlikely to be exploited since those are for internal usage or use a custom implementation in their case.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45047" }, { "category": "external", "summary": "RHBZ#2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45047", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047" }, { "category": "external", "summary": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html", "url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html" } ], "release_date": "2022-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" }, { "category": "workaround", "details": "From the maintainer:\n\nFor Apache MINA SSHD \u003c= 2.9.1, do not use org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to generate and later load your server\u0027s host key. Use separately generated host key files, for instance in OpenSSH format, and load them via a org.apache.sshd.common.keyprovider.FileKeyPairProvider instead. Or use a custom implementation instead of \nSimpleGeneratorHostKeyProvider that uses the OpenSSH format for storing and loading the host key (via classes OpenSSHKeyPairResourceWriter and OpenSSHKeyPairResourceParser).", "product_ids": [ "Red Hat Single Sign-On 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mina-sshd: Java unsafe deserialization vulnerability" }, { "cve": "CVE-2022-45693", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155970" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jettison, where it is vulnerable to a denial of service caused by a stack-based buffer overflow. By sending a specially-crafted request using the map parameter, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has determined the impact of this flaw to be Moderate; a successful attack using this flaw would require the processing of untrusted, unsanitized, or unrestricted user inputs, which runs counter to established Red Hat security practices.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45693" }, { "category": "external", "summary": "RHBZ#2155970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45693" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos" }, { "cve": "CVE-2022-46175", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156263" } ], "notes": [ { "category": "description", "text": "A flaw was found in the json5 package. The affected version of the json5 package could allow an attacker to set arbitrary and unexpected keys on the object returned from JSON5.parse.", "title": "Vulnerability description" }, { "category": "summary", "text": "json5: Prototype Pollution in JSON5 via Parse Method", "title": "Vulnerability summary" }, { "category": "other", "text": "The json5 package is a build-time dependency in Red Hat products and is not used in production runtime. Hence, the impact is set to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46175" }, { "category": "external", "summary": "RHBZ#2156263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175" }, { "category": "external", "summary": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h", "url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h" } ], "release_date": "2022-12-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "json5: Prototype Pollution in JSON5 via Parse Method" }, { "cve": "CVE-2022-46363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155681" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache CXF that could allow an attacker to perform a remote directory listing or code exfiltration. This issue only applies when the CXFServlet is configured with both the static-resources-list and redirect-query-check attributes. These attributes are not supposed to be used together, so the issue can only occur if the CXF service is misconfigured.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: directory listing / code exfiltration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46363" }, { "category": "external", "summary": "RHBZ#2155681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46363", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46363" }, { "category": "external", "summary": "https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c", "url": "https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "CXF: directory listing / code exfiltration" }, { "cve": "CVE-2022-46364", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155682" } ], "notes": [ { "category": "description", "text": "A SSRF vulnerability was found in Apache CXF. This issue occurs when parsing the href attribute of XOP:Include in MTOM requests, allowing an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSRF Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Integration Camel Quarkus does not support CXF extensions and so is affected at a reduced impact of Moderate.\nThe RHSSO server does not ship Apache CXF. The component mentioned in CVE-2022-46364 is a transitive dependency coming from Fuse adapters and the test suite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46364" }, { "category": "external", "summary": "RHBZ#2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2", "url": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "CXF: SSRF Vulnerability" }, { "acknowledgments": [ { "names": [ "Sourav Kumar" ], "organization": "https://github.com/souravs17031999", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2023-0091", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-10-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2158585" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: Client Registration endpoint does not check token revocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0091" }, { "category": "external", "summary": "RHBZ#2158585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0091", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0091" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg" }, { "category": "external", "summary": "https://github.com/keycloak/security/issues/27", "url": "https://github.com/keycloak/security/issues/27" } ], "release_date": "2022-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: Client Registration endpoint does not check token revocation" }, { "acknowledgments": [ { "names": [ "Jordi Zayuelas i Mu\u00f1oz" ], "organization": "A1 Digital", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2023-0264", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "discovery_date": "2023-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2160585" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak\u0027s OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, Integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: user impersonation via stolen uuid code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0264" }, { "category": "external", "summary": "RHBZ#2160585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0264" } ], "release_date": "2023-02-28T18:58:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T21:58:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Single Sign-On 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1049" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: user impersonation via stolen uuid code" } ] }
rhsa-2023_1043
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.6.2 packages are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.2 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: XSS on impersonation under specific circumstances (CVE-2022-1438)\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n* keycloak: missing email notification template allowlist (CVE-2022-1274)\n* keycloak: minimist: prototype pollution (CVE-2021-44906)\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n* undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations (CVE-2022-2764)\n* snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)\n* loader-utils: loader-utils:Regular expression denial of service (CVE-2022-37603)\n* keycloak: Session takeover with OIDC offline refreshtokens (CVE-2022-3916)\n* keycloak: path traversal via double URL encoding (CVE-2022-3782)\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode (CVE-2022-38749)\n* snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match (CVE-2022-38751)\n* snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject (CVE-2022-38750)\n* keycloak: Client Registration endpoint does not check token revocation (CVE-2023-0091)\n* keycloak: glob-parent: Regular Expression Denial of Service (CVE-2021-35065)\n* json5: Prototype Pollution in JSON5 via Parse Method (CVE-2022-46175)\n* keycloak: keycloak: user impersonation via stolen uuid code (CVE-2023-0264)\n* snakeyaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n* CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)\n* rcue-bootstrap: bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)\n* jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)\n* sshd-common: mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)\n* jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)\n* jettison: parser crash by stackoverflow (CVE-2022-40149)\n* jackson-databind: use of deeply nested arrays (CVE-2022-42004)\n* jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)\n* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)\n* jquery: Passing HTML containing \u003coption\u003e elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)\n* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)\n* jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)\n* CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363)\n* keycloak: reflected XSS attack (CVE-2022-4137)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1043", "url": "https://access.redhat.com/errata/RHSA-2023:1043" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1601614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601614" }, { "category": "external", "summary": "1601617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601617" }, { "category": "external", "summary": "1701972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" }, { "category": "external", "summary": "1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "2031904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031904" }, { "category": "external", "summary": "2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2073157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" }, { "category": "external", "summary": "2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "2129707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129707" }, { "category": "external", "summary": "2129709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129709" }, { "category": "external", "summary": "2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "2135770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135770" }, { "category": "external", "summary": "2135771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771" }, { "category": "external", "summary": "2138971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971" }, { "category": "external", "summary": "2140597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140597" }, { "category": "external", "summary": "2141404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141404" }, { "category": "external", "summary": "2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "2148496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148496" }, { "category": "external", "summary": "2150009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009" }, { "category": "external", "summary": "2155681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155681" }, { "category": "external", "summary": "2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "2155970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155970" }, { "category": "external", "summary": "2156263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263" }, { "category": "external", "summary": "2156324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324" }, { "category": "external", "summary": "2158585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158585" }, { "category": "external", "summary": "2160585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160585" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1043.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 7", "tracking": { "current_release_date": "2024-12-18T00:37:43+00:00", "generator": { "date": "2024-12-18T00:37:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:1043", "initial_release_date": "2023-03-01T22:02:40+00:00", "revision_history": [ { "date": "2023-03-01T22:02:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-03-01T22:02:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:37:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.6 for RHEL 7 Server", "product": { "name": "Red Hat Single Sign-On 7.6 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "product": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "product_id": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.6-1.redhat_00001.1.el7sso?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.6-1.redhat_00001.1.el7sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.6-1.redhat_00001.1.el7sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src" }, "product_reference": "rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "relates_to_product_reference": "7Server-RHSSO-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14040", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601614" } ], "notes": [ { "category": "description", "text": "In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6.2 and newer versions don\u0027t use the bootstrap library, hence are not affected by this flaw.\n\nRed Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.\n\nRed Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14040" }, { "category": "external", "summary": "RHBZ#1601614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601614" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14040" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute" }, { "cve": "CVE-2018-14042", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601617" } ], "notes": [ { "category": "description", "text": "In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.", "title": "Vulnerability description" }, { "category": "summary", "text": "bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6.2 and newer versions don\u0027t use the bootstrap library, hence are not affected by this flaw.\n\nRed Hat CloudForms 4.6 and newer versions include the vulnerable component, but there is no risk of exploitation, since there is no possible vector to access the vulnerability. Older Red Hat CloudForms versions don\u0027t use the vulnerable component at all.\n\nRed Hat Enterprise Satellite 5 is now in Maintenance Support 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 5 Life Cycle: https://access.redhat.com/support/policy/updates/satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14042" }, { "category": "external", "summary": "RHBZ#1601617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601617" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14042", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14042" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14042", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14042" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip" }, { "cve": "CVE-2019-11358", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1701972" } ], "notes": [ { "category": "description", "text": "A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modifying objects up the prototype chain, including the global Object. A crafted JSON object passed to a vulnerable method could lead to denial of service or data injection, with various consequences.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Virtualization 4.2 EUS contains the affected version of bootstrap in the packages ovirt-js-dependencies and ovirt-engine-dashboard. These packages are deprecated in Red Hat Virtualization 4.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11358" }, { "category": "external", "summary": "RHBZ#1701972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11358", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358" }, { "category": "external", "summary": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/", "url": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/" }, { "category": "external", "summary": "https://www.drupal.org/sa-core-2019-006", "url": "https://www.drupal.org/sa-core-2019-006" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection" }, { "cve": "CVE-2020-11022", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828406" } ], "notes": [ { "category": "description", "text": "A Cross-site scripting (XSS) vulnerability exists in JQuery. This flaw allows an attacker with the ability to supply input to the \u2018HTML\u2019 function to inject Javascript into the page where that input is rendered, and have it delivered by the browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method", "title": "Vulnerability summary" }, { "category": "other", "text": "No supported release of Red Hat OpenStack Platform is affected by this vulnerability as no shipped packages contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11022" }, { "category": "external", "summary": "RHBZ#1828406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11022", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2" } ], "release_date": "2020-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method" }, { "cve": "CVE-2020-11023", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1850004" } ], "notes": [ { "category": "description", "text": "A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery\u0027s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux versions 6, 7, and 8 ship a vulnerable version of JQuery in the `pcs` component. However, the vulnerability has not been found to be exploitable in reasonable scenarios. \n\nIn RHEL7, pcs-0.9.169-3.el7_9.3 [RHSA-2022:7343] contains an updated version of jquery (3.6.0), which does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11023" }, { "category": "external", "summary": "RHBZ#1850004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023" }, { "category": "external", "summary": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/", "url": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" } ], "release_date": "2020-04-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods" }, { "cve": "CVE-2021-35065", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156324" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "glob-parent: Regular Expression Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The glob-parent package is a transitive dependency and this is not used directly in any of the Red Hat products. Hence, the impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-35065" }, { "category": "external", "summary": "RHBZ#2156324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-35065", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35065" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294", "url": "https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294" } ], "release_date": "2022-12-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glob-parent: Regular Expression Denial of Service" }, { "cve": "CVE-2021-44906", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2066009" } ], "notes": [ { "category": "description", "text": "An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker to trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "minimist: prototype pollution", "title": "Vulnerability summary" }, { "category": "other", "text": "The original fix for CVE-2020-7598 was incomplete as it was still possible to bypass in some cases. While this flaw (CVE-2021-44906) enables attackers to control objects that they should not have access to, actual exploitation would still require a chain of independent flaws. Even though the CVSS for CVE-2021-44906 is higher than CVE-2020-7598, they are both rated as having Moderate impact.\n\nWithin Red Hat Satellite 6 this flaw has been rated as having a security impact of Low. It is not currently planned to be addressed there, as the minimist library is only included in the -doc subpackage and is part of test fixtures that are not in the execution path used by the rabl gem.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44906" }, { "category": "external", "summary": "RHBZ#2066009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-xvch-5gv4-984h", "url": "https://github.com/advisories/GHSA-xvch-5gv4-984h" } ], "release_date": "2022-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "minimist: prototype pollution" }, { "acknowledgments": [ { "names": [ "Marcus Nilsson" ], "organization": "usd AG" } ], "cve": "CVE-2022-1274", "cwe": { "id": "CWE-80", "name": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)" }, "discovery_date": "2022-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073157" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: HTML injection in execute-actions-email Admin REST API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1274" }, { "category": "external", "summary": "RHBZ#2073157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1274", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725" } ], "release_date": "2023-02-28T18:57:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: HTML injection in execute-actions-email Admin REST API" }, { "acknowledgments": [ { "names": [ "Grzegorz Tworek" ], "organization": "SISOFT s.c." } ], "cve": "CVE-2022-1438", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031904" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. Under specific circumstances, HTML entities are not sanitized during user impersonation, resulting in a Cross-site scripting (XSS) vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: XSS on impersonation under specific circumstances", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1438" }, { "category": "external", "summary": "RHBZ#2031904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1438", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1438" } ], "release_date": "2023-02-28T18:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: XSS on impersonation under specific circumstances" }, { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2150009" } ], "notes": [ { "category": "description", "text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).", "title": "Vulnerability description" }, { "category": "summary", "text": "SnakeYaml: Constructor Deserialization Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1471" }, { "category": "external", "summary": "RHBZ#2150009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2", "url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2" } ], "release_date": "2022-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "SnakeYaml: Constructor Deserialization Remote Code Execution" }, { "cve": "CVE-2022-2764", "discovery_date": "2022-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2117506" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow with EJB invocations. This flaw allows an attacker to generate a valid HTTP request and send it to the server on an established connection after removing the LAST_CHUNK from the bytes, causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2764" }, { "category": "external", "summary": "RHBZ#2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2764" } ], "release_date": "2022-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations" }, { "acknowledgments": [ { "names": [ "Peter Flintholm" ], "organization": "Trifork" } ], "cve": "CVE-2022-3916", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2022-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141404" } ], "notes": [ { "category": "description", "text": "A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: Session takeover with OIDC offline refreshtokens", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3916" }, { "category": "external", "summary": "RHBZ#2141404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3916" } ], "release_date": "2022-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: Session takeover with OIDC offline refreshtokens" }, { "cve": "CVE-2022-4137", "cwe": { "id": "CWE-81", "name": "Improper Neutralization of Script in an Error Message Web Page" }, "discovery_date": "2022-11-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2148496" } ], "notes": [ { "category": "description", "text": "A reflected cross-site scripting (XSS) vulnerability was found in the \u0027oob\u0027 OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: reflected XSS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4137" }, { "category": "external", "summary": "RHBZ#2148496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4137", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137" } ], "release_date": "2023-03-01T13:56:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: reflected XSS attack" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-25857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126789" } ], "notes": [ { "category": "description", "text": "A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Denial of Service due to missing nested depth limitation for collections", "title": "Vulnerability summary" }, { "category": "other", "text": "For RHEL-8 it\u0027s downgraded to moderate because \"snakeyaml\" itself in RHEL 8 or RHEL-9 isn\u0027t shipped and \"prometheus-jmx-exporter\" is needed as build dependency. And it\u0027s not directly exploitable, hence severity marked as moderate.\nRed Hat Integration and AMQ products are not vulnerable to this flaw, so their severity has been lowered to moderate.\nRed Hat Single Sign-On uses snakeyaml from liquibase-core and is only used when performing migrations and would require administrator privileges to execute, hence severity marked as Low.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be present soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25857" }, { "category": "external", "summary": "RHBZ#2126789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25857", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857" }, { "category": "external", "summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525" } ], "release_date": "2022-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "snakeyaml: Denial of Service due to missing nested depth limitation for collections" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-37603", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140597" } ], "notes": [ { "category": "description", "text": "A flaw was found in loader-utils webpack library. When the url variable from interpolateName is set, the prototype can be polluted. This issue could lead to a regular expression Denial of Service (ReDoS), affecting the availability of the affected component.", "title": "Vulnerability description" }, { "category": "summary", "text": "loader-utils: Regular expression denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-37603" }, { "category": "external", "summary": "RHBZ#2140597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140597" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-37603", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-37603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37603" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "loader-utils: Regular expression denial of service" }, { "cve": "CVE-2022-38749", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129706" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38749" }, { "category": "external", "summary": "RHBZ#2129706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38749", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38749" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode" }, { "cve": "CVE-2022-38750", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129707" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38750" }, { "category": "external", "summary": "RHBZ#2129707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129707" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38750", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38750" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject" }, { "cve": "CVE-2022-38751", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2129709" } ], "notes": [ { "category": "description", "text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.\n\nSatellite component Candlepin does not directly use snakeyaml, so it is not affected. Regardless, an update with the latest, unaffected snakeyaml version will be provided at next release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38751" }, { "category": "external", "summary": "RHBZ#2129709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38751", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38751" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38751", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38751" } ], "release_date": "2022-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match" }, { "cve": "CVE-2022-40149", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135771" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. This flaw allows an attacker to supply content that causes the parser to crash by writing outside the memory bounds if the parser is running on user-supplied input, resulting in a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: parser crash by stackoverflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40149" }, { "category": "external", "summary": "RHBZ#2135771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149" }, { "category": "external", "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1", "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: parser crash by stackoverflow" }, { "cve": "CVE-2022-40150", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135770" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. If the parser is running on user-supplied input, an attacker may supply content that causes the parser to crash, causing memory exhaustion. This effect may support a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: memory exhaustion via user-supplied XML or JSON data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40150" }, { "category": "external", "summary": "RHBZ#2135770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40150", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40150" }, { "category": "external", "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1", "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jettison: memory exhaustion via user-supplied XML or JSON data" }, { "cve": "CVE-2022-42003", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135244" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled due to unchecked primitive value deserializers to avoid deep wrapper array nesting.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42003" }, { "category": "external", "summary": "RHBZ#2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS" }, { "cve": "CVE-2022-42004", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135247" } ], "notes": [ { "category": "description", "text": "A flaw was found In FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion due to the lack of a check in BeanDeserializer._deserializeFromArray to prevent the use of deeply nested arrays. An application is only vulnerable with certain customized choices for deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: use of deeply nested arrays", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42004" }, { "category": "external", "summary": "RHBZ#2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42004", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: use of deeply nested arrays" }, { "cve": "CVE-2022-45047", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2145194" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache MINA SSHD, when using Java deserialization to load a serialized java.security.PrivateKey. An attacker could benefit from unsafe deserialization by inserting unsecured data that may affect the application or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "mina-sshd: Java unsafe deserialization vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Impact as High as there\u0027s a mitigation for minimizing the impact which the flaw requires org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to be impacted, which would require an external/public API for an attacker to benefit from it. \n\nRed Hat Fuse 7 and Red Hat JBoss Enterprise Application Platform 7 have a lower rate (moderate) as it\u0027s very unlikely to be exploited since those are for internal usage or use a custom implementation in their case.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45047" }, { "category": "external", "summary": "RHBZ#2145194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45047", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047" }, { "category": "external", "summary": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html", "url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html" } ], "release_date": "2022-11-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" }, { "category": "workaround", "details": "From the maintainer:\n\nFor Apache MINA SSHD \u003c= 2.9.1, do not use org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to generate and later load your server\u0027s host key. Use separately generated host key files, for instance in OpenSSH format, and load them via a org.apache.sshd.common.keyprovider.FileKeyPairProvider instead. Or use a custom implementation instead of \nSimpleGeneratorHostKeyProvider that uses the OpenSSH format for storing and loading the host key (via classes OpenSSHKeyPairResourceWriter and OpenSSHKeyPairResourceParser).", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mina-sshd: Java unsafe deserialization vulnerability" }, { "cve": "CVE-2022-45693", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155970" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jettison, where it is vulnerable to a denial of service caused by a stack-based buffer overflow. By sending a specially-crafted request using the map parameter, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has determined the impact of this flaw to be Moderate; a successful attack using this flaw would require the processing of untrusted, unsanitized, or unrestricted user inputs, which runs counter to established Red Hat security practices.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45693" }, { "category": "external", "summary": "RHBZ#2155970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45693" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: If the value in map is the map\u0027s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos" }, { "cve": "CVE-2022-46175", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156263" } ], "notes": [ { "category": "description", "text": "A flaw was found in the json5 package. The affected version of the json5 package could allow an attacker to set arbitrary and unexpected keys on the object returned from JSON5.parse.", "title": "Vulnerability description" }, { "category": "summary", "text": "json5: Prototype Pollution in JSON5 via Parse Method", "title": "Vulnerability summary" }, { "category": "other", "text": "The json5 package is a build-time dependency in Red Hat products and is not used in production runtime. Hence, the impact is set to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46175" }, { "category": "external", "summary": "RHBZ#2156263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46175" }, { "category": "external", "summary": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h", "url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h" } ], "release_date": "2022-12-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "json5: Prototype Pollution in JSON5 via Parse Method" }, { "cve": "CVE-2022-46363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155681" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache CXF that could allow an attacker to perform a remote directory listing or code exfiltration. This issue only applies when the CXFServlet is configured with both the static-resources-list and redirect-query-check attributes. These attributes are not supposed to be used together, so the issue can only occur if the CXF service is misconfigured.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: directory listing / code exfiltration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46363" }, { "category": "external", "summary": "RHBZ#2155681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155681" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46363", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46363" }, { "category": "external", "summary": "https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c", "url": "https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "CXF: directory listing / code exfiltration" }, { "cve": "CVE-2022-46364", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155682" } ], "notes": [ { "category": "description", "text": "A SSRF vulnerability was found in Apache CXF. This issue occurs when parsing the href attribute of XOP:Include in MTOM requests, allowing an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSRF Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Integration Camel Quarkus does not support CXF extensions and so is affected at a reduced impact of Moderate.\nThe RHSSO server does not ship Apache CXF. The component mentioned in CVE-2022-46364 is a transitive dependency coming from Fuse adapters and the test suite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46364" }, { "category": "external", "summary": "RHBZ#2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2", "url": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "CXF: SSRF Vulnerability" }, { "acknowledgments": [ { "names": [ "Sourav Kumar" ], "organization": "https://github.com/souravs17031999", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2023-0091", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-10-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2158585" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: Client Registration endpoint does not check token revocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0091" }, { "category": "external", "summary": "RHBZ#2158585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0091", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0091" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg" }, { "category": "external", "summary": "https://github.com/keycloak/security/issues/27", "url": "https://github.com/keycloak/security/issues/27" } ], "release_date": "2022-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: Client Registration endpoint does not check token revocation" }, { "acknowledgments": [ { "names": [ "Jordi Zayuelas i Mu\u00f1oz" ], "organization": "A1 Digital", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2023-0264", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "discovery_date": "2023-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2160585" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak\u0027s OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, Integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: user impersonation via stolen uuid code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0264" }, { "category": "external", "summary": "RHBZ#2160585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0264" } ], "release_date": "2023-02-28T18:58:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-01T22:02:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1043" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.6-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: user impersonation via stolen uuid code" } ] }
rhsa-2022_6272
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Service Mesh 2.0.11.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation.\n\nThis advisory covers the RPM packages for the release.\n\nSecurity Fix(es):\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6272", "url": "https://access.redhat.com/errata/RHSA-2022:6272" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "OSSM-1864", "url": "https://issues.redhat.com/browse/OSSM-1864" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6272.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.11 security update", "tracking": { "current_release_date": "2024-12-18T00:35:15+00:00", "generator": { "date": "2024-12-18T00:35:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6272", "initial_release_date": "2022-08-31T15:00:53+00:00", "revision_history": [ { "date": "2022-08-31T15:00:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-31T15:00:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:35:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 2.0", "product": { "name": "OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:2.0.11-1.el8.src", "product": { "name": "servicemesh-cni-0:2.0.11-1.el8.src", "product_id": "servicemesh-cni-0:2.0.11-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.11-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.src", "product_id": "servicemesh-prometheus-0:2.14.0-18.el8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-18.el8.1?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.11-1.el8.src", "product": { "name": "servicemesh-0:2.0.11-1.el8.src", "product_id": "servicemesh-0:2.0.11-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.11-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.11-1.el8.src", "product": { "name": "servicemesh-operator-0:2.0.11-1.el8.src", "product_id": "servicemesh-operator-0:2.0.11-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.11-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.11-1.el8.src", "product": { "name": "servicemesh-proxy-0:2.0.11-1.el8.src", "product_id": "servicemesh-proxy-0:2.0.11-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.11-1.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:2.0.11-1.el8.x86_64", "product": { "name": "servicemesh-cni-0:2.0.11-1.el8.x86_64", "product_id": "servicemesh-cni-0:2.0.11-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.11-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-18.el8.1?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.11-1.el8.x86_64", "product": { "name": "servicemesh-0:2.0.11-1.el8.x86_64", "product_id": "servicemesh-0:2.0.11-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.11-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "product_id": "servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.11-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:2.0.11-1.el8.x86_64", "product": { "name": "servicemesh-mixc-0:2.0.11-1.el8.x86_64", "product_id": "servicemesh-mixc-0:2.0.11-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.11-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:2.0.11-1.el8.x86_64", "product": { "name": "servicemesh-mixs-0:2.0.11-1.el8.x86_64", "product_id": "servicemesh-mixs-0:2.0.11-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.11-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.11-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.11-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.11-1.el8.x86_64", "product": { "name": "servicemesh-operator-0:2.0.11-1.el8.x86_64", "product_id": "servicemesh-operator-0:2.0.11-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.11-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.11-1.el8.x86_64", "product": { "name": "servicemesh-proxy-0:2.0.11-1.el8.x86_64", "product_id": "servicemesh-proxy-0:2.0.11-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.11-1.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:2.0.11-1.el8.ppc64le", "product": { "name": "servicemesh-cni-0:2.0.11-1.el8.ppc64le", "product_id": "servicemesh-cni-0:2.0.11-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.11-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "product": { "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "product_id": "servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-18.el8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.11-1.el8.ppc64le", "product": { "name": "servicemesh-0:2.0.11-1.el8.ppc64le", "product_id": "servicemesh-0:2.0.11-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.11-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "product": { "name": "servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "product_id": "servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.11-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "product": { "name": "servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "product_id": "servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.11-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "product": { "name": "servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "product_id": "servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.11-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "product": { "name": "servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "product_id": "servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.11-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "product": { "name": "servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "product_id": "servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.11-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.11-1.el8.ppc64le", "product": { "name": "servicemesh-operator-0:2.0.11-1.el8.ppc64le", "product_id": "servicemesh-operator-0:2.0.11-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.11-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "product": { "name": "servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "product_id": "servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.11-1.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:2.0.11-1.el8.s390x", "product": { "name": "servicemesh-cni-0:2.0.11-1.el8.s390x", "product_id": "servicemesh-cni-0:2.0.11-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.0.11-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "product": { "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "product_id": "servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-18.el8.1?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-0:2.0.11-1.el8.s390x", "product": { "name": "servicemesh-0:2.0.11-1.el8.s390x", "product_id": "servicemesh-0:2.0.11-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.0.11-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:2.0.11-1.el8.s390x", "product": { "name": "servicemesh-istioctl-0:2.0.11-1.el8.s390x", "product_id": "servicemesh-istioctl-0:2.0.11-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.11-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:2.0.11-1.el8.s390x", "product": { "name": "servicemesh-mixc-0:2.0.11-1.el8.s390x", "product_id": "servicemesh-mixc-0:2.0.11-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.11-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:2.0.11-1.el8.s390x", "product": { "name": "servicemesh-mixs-0:2.0.11-1.el8.s390x", "product_id": "servicemesh-mixs-0:2.0.11-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.11-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "product": { "name": "servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "product_id": "servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.11-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "product": { "name": "servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "product_id": "servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.11-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.0.11-1.el8.s390x", "product": { "name": "servicemesh-operator-0:2.0.11-1.el8.s390x", "product_id": "servicemesh-operator-0:2.0.11-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.0.11-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:2.0.11-1.el8.s390x", "product": { "name": "servicemesh-proxy-0:2.0.11-1.el8.s390x", "product_id": "servicemesh-proxy-0:2.0.11-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.11-1.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.11-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.ppc64le" }, "product_reference": "servicemesh-0:2.0.11-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.11-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.s390x" }, "product_reference": "servicemesh-0:2.0.11-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.11-1.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.src" }, "product_reference": "servicemesh-0:2.0.11-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.0.11-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.x86_64" }, "product_reference": "servicemesh-0:2.0.11-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.11-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.ppc64le" }, "product_reference": "servicemesh-cni-0:2.0.11-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.11-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.s390x" }, "product_reference": "servicemesh-cni-0:2.0.11-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.11-1.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.src" }, "product_reference": "servicemesh-cni-0:2.0.11-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.0.11-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.x86_64" }, "product_reference": "servicemesh-cni-0:2.0.11-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:2.0.11-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.ppc64le" }, "product_reference": "servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:2.0.11-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.s390x" }, "product_reference": "servicemesh-istioctl-0:2.0.11-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:2.0.11-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:2.0.11-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.ppc64le" }, "product_reference": "servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:2.0.11-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.s390x" }, "product_reference": "servicemesh-mixc-0:2.0.11-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:2.0.11-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:2.0.11-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:2.0.11-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.ppc64le" }, "product_reference": "servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:2.0.11-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.s390x" }, "product_reference": "servicemesh-mixs-0:2.0.11-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:2.0.11-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:2.0.11-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.11-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.ppc64le" }, "product_reference": "servicemesh-operator-0:2.0.11-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.11-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.s390x" }, "product_reference": "servicemesh-operator-0:2.0.11-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.11-1.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.src" }, "product_reference": "servicemesh-operator-0:2.0.11-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.0.11-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.x86_64" }, "product_reference": "servicemesh-operator-0:2.0.11-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le" }, "product_reference": "servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.0.11-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.s390x" }, "product_reference": "servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le" }, "product_reference": "servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x" }, "product_reference": "servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le" }, "product_reference": "servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.s390x" }, "product_reference": "servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-18.el8.1.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.11-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.ppc64le" }, "product_reference": "servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.11-1.el8.s390x as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.s390x" }, "product_reference": "servicemesh-proxy-0:2.0.11-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.11-1.el8.src as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.src" }, "product_reference": "servicemesh-proxy-0:2.0.11-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.0.11-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0", "product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:2.0.11-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T15:00:53+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6272" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T15:00:53+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6272" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-cni-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-operator-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.11-1.el8.x86_64", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.ppc64le", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.s390x", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.src", "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-18.el8.1.x86_64", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.ppc64le", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.s390x", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.src", "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.11-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_6370
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General\nAvailability release images, which fix security issues and bugs.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix security issues and several bugs. See the following Release Notes documentation, which will be updated shortly for this\nrelease, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/\n\nSecurity fixes: \n\n* CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS\n\n* CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add\n\n* CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header\n\n* CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions\n\n* CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip\n\n* CVE-2022-30630 golang: io/fs: stack exhaustion in Glob\n\n* CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read\n\n* CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob\n\n* CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal\n\n* CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode\n\n* CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working\n\nBug fixes:\n\n* assisted-service repo pin-latest.py script should allow custom tags to be pinned (BZ# 2065661)\n\n* assisted-service-build image is too big in size (BZ# 2066059)\n\n* assisted-service pin-latest.py script should exclude the postgres image (BZ# 2076901)\n\n* PXE artifacts need to be served via HTTP (BZ# 2078531)\n\n* Implementing new service-agent protocol on agent side (BZ# 2081281)\n\n* RHACM 2.6.0 images (BZ# 2090906)\n\n* Assisted service POD keeps crashing after a bare metal host is created (BZ# 2093503)\n\n* Assisted service triggers the worker nodes re-provisioning on the hub cluster when the converged flow is enabled (BZ# 2096106)\n\n* Fix assisted CI jobs that fail for cluster-info readiness (BZ# 2097696)\n\n* Nodes are required to have installation disks of at least 120GB instead of at minimum of 100GB (BZ# 2099277)\n\n* The pre-selected search keyword is not readable (BZ# 2107736)\n\n* The value of label expressions in the new placement for policy and policysets cannot be shown real-time from UI (BZ# 2111843)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6370", "url": "https://access.redhat.com/errata/RHSA-2022:6370" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2065661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2065661" }, { "category": "external", "summary": "2066059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066059" }, { "category": "external", "summary": "2076901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076901" }, { "category": "external", "summary": "2078531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078531" }, { "category": "external", "summary": "2081281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081281" }, { "category": "external", "summary": "2090901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090901" }, { "category": "external", "summary": "2090906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090906" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2093503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093503" }, { "category": "external", "summary": "2096106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096106" }, { "category": "external", "summary": "2096445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096445" }, { "category": "external", "summary": "2096460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096460" }, { "category": "external", "summary": "2097696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097696" }, { "category": "external", "summary": "2099277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099277" }, { "category": "external", "summary": "2103703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103703" }, { "category": "external", "summary": "2104117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104117" }, { "category": "external", "summary": "2104984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104984" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "2105339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105339" }, { "category": "external", "summary": "2105357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105357" }, { "category": "external", "summary": "2106347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106347" }, { "category": "external", "summary": "2106882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106882" }, { "category": "external", "summary": "2107049", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107049" }, { "category": "external", "summary": "2107065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107065" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107370" }, { "category": "external", "summary": "2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "2108888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108888" }, { "category": "external", "summary": "2109370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109370" }, { "category": "external", "summary": "2111203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111203" }, { "category": "external", "summary": "2111218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111218" }, { "category": "external", "summary": "2111651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111651" }, { "category": "external", "summary": "2111663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111663" }, { "category": "external", "summary": "2111671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111671" }, { "category": "external", "summary": "2111770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111770" }, { "category": "external", "summary": "2111843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111843" }, { "category": "external", "summary": "2112180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112180" }, { "category": "external", "summary": "2112281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112281" }, { "category": "external", "summary": "2112318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112318" }, { "category": "external", "summary": "2112321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112321" }, { "category": "external", "summary": "2112426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112426" }, { "category": "external", "summary": "2112478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112478" }, { "category": "external", "summary": "2112793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112793" }, { "category": "external", "summary": "2112803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112803" }, { "category": "external", "summary": "2113787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113787" }, { "category": "external", "summary": "2113838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113838" }, { "category": "external", "summary": "2113842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113842" }, { "category": "external", "summary": "2114982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114982" }, { "category": "external", "summary": "2115622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115622" }, { "category": "external", "summary": "2115723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115723" }, { "category": "external", "summary": "2115993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115993" }, { "category": "external", "summary": "2116211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116211" }, { "category": "external", "summary": "2116329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116329" }, { "category": "external", "summary": "2117113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117113" }, { "category": "external", "summary": "2117187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117187" }, { "category": "external", "summary": "2117480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117480" }, { "category": "external", "summary": "2118338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118338" }, { "category": "external", "summary": "2119326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119326" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6370.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes", "tracking": { "current_release_date": "2024-12-18T00:35:50+00:00", "generator": { "date": "2024-12-18T00:35:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6370", "initial_release_date": "2022-09-06T22:27:58+00:00", "revision_history": [ { "date": "2022-09-06T22:27:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-06T22:27:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:35:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.6::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.6.0-104" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.6.0-12" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.6.0-21" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "product_id": "rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.6.0-65" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.6.0-18" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.6.0-14" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.6.0-15" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.6.0-17" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.6.0-13" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.6.0-15" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.6.0-6" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.6.0-6" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.6.0-14" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.6.0-27" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.6.0-43" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.6.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.6.0-17" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "product_id": "rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.6.0-23" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.6.0-6" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.6.0-104" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.6.0-12" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.6.0-21" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "product_id": "rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.6.0-65" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.6.0-18" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.6.0-14" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.6.0-15" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.6.0-17" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.6.0-13" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.6.0-15" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.6.0-6" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.6.0-6" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.6.0-14" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.6.0-27" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.6.0-43" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.6.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.6.0-17" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "product_id": "rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.6.0-23" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.6.0-6" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.6.0-104" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.6.0-12" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.6.0-21" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.6.0-65" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.6.0-18" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.6.0-14" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.6.0-15" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.6.0-17" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.6.0-13" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.6.0-15" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.6.0-6" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.6.0-6" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.6.0-14" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.6.0-27" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.6.0-43" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.6.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.6.0-17" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.6.0-23" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.6.0-6" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "product_id": "rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.6.0-104" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.6.0-12" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.6.0-21" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "product": { "name": "rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "product_id": "rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.6.0-65" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.6.0-18" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.6.0-14" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.6.0-15" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.6.0-17" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "product_id": "rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.6.0-13" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.6.0-15" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "product_id": "rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "product": { "name": "rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "product_id": "rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.6.0-6" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.6.0-6" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.6.0-14" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.6.0-27" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.6.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.6.0-43" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "product_id": "rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "product_id": "rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "product_id": "rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.6.0-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.6.0-19" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.6.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "product": { "name": "rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "product_id": "rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.6.0-17" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "product_id": "rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.6.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "product": { "name": "rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "product_id": "rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.6.0-23" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "product": { "name": "rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "product_id": "rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.6.0-6" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64" }, "product_reference": "rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64" }, "product_reference": "rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-1962", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107376" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: stack exhaustion in all Parse* functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1962" }, { "category": "external", "summary": "RHBZ#2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962" }, { "category": "external", "summary": "https://go.dev/issue/53616", "url": "https://go.dev/issue/53616" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: go/parser: stack exhaustion in all Parse* functions" }, { "cve": "CVE-2022-28131", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107390" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Decoder.Skip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28131" }, { "category": "external", "summary": "RHBZ#2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131" }, { "category": "external", "summary": "https://go.dev/issue/53614", "url": "https://go.dev/issue/53614" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Decoder.Skip" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-30630", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107371" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: io/fs: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30630" }, { "category": "external", "summary": "RHBZ#2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630" }, { "category": "external", "summary": "https://go.dev/issue/53415", "url": "https://go.dev/issue/53415" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: io/fs: stack exhaustion in Glob" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" }, { "cve": "CVE-2022-30632", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107386" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: path/filepath: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30632" }, { "category": "external", "summary": "RHBZ#2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632" }, { "category": "external", "summary": "https://go.dev/issue/53416", "url": "https://go.dev/issue/53416" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: path/filepath: stack exhaustion in Glob" }, { "cve": "CVE-2022-30633", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107392" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Unmarshal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30633" }, { "category": "external", "summary": "RHBZ#2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633" }, { "category": "external", "summary": "https://go.dev/issue/53611", "url": "https://go.dev/issue/53611" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Unmarshal" }, { "cve": "CVE-2022-30635", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107388" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/gob: stack exhaustion in Decoder.Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30635" }, { "category": "external", "summary": "RHBZ#2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635" }, { "category": "external", "summary": "https://go.dev/issue/53615", "url": "https://go.dev/issue/53615" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/gob: stack exhaustion in Decoder.Decode" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107383" } ], "notes": [ { "category": "description", "text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32148" }, { "category": "external", "summary": "RHBZ#2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148" }, { "category": "external", "summary": "https://go.dev/issue/53423", "url": "https://go.dev/issue/53423" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-06T22:27:58+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6370" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:615ab5d9542759d921634737709e84a8e65d003ea136e5d22858d380225fd177_amd64", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:958b729d30f10b9c121e68ac8ede2054ed29cc52a9a7d6df0537ed221aa74358_s390x", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:b5bef941b4e0b5b3529ca5b2311c85295b9f6d12e482a9cbdad691c2406541f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:f6194b9056d77e54f3c74caa9eab87bd1df1818d082fc807229d1c44ec6c88c4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:45616ed43b53d3a83e65828118f09430396f5bcb0566ae3a65d937b59f0d873e_s390x", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:8c48441cfa850ea1274932e94da0831618c10f91022619c779304501a75fb161_amd64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cc1c196b19c5fd8f313c6136359cc9dd37b5f59d32a581b10cf89b80b7d0cbf4_arm64", "8Base-RHACM-2.6:rhacm2/acm-grafana-rhel8@sha256:cdf24e68e50be1350566243f6d2cb1403d09ab68e5fed39ea6c56212e42b90f1_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:1457ff5cfd61611fdc968d4af5b020d835e107b97932c7ba7b3f5ed4cbd0e39f_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:39842906b3846418bc31098e2abad08210118d86aa683e9e5fd04a97822df22d_arm64", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:8a69add2d90a1e094de8510052b683e1765153da75e316ad7778499af0c5ddf9_s390x", "8Base-RHACM-2.6:rhacm2/acm-must-gather-rhel8@sha256:dca91134a2c1c33c736afcd4c9373749448641385f39162c74e115691289e843_amd64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:0eac6124f59492d09c1ae650025d59ea0e8547d9f9c832cb9607b09254ff6ddd_s390x", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:1cbcd58a4c23e4c89a6a0509f78802a5aa21205db2784ebc9772b99a3917b183_arm64", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:997aaee36f0bed47e231925a3f2c2ecc503410e54b35727f035c72477f3d1944_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-operator-bundle@sha256:ce699187f250b93976b8063228ac12d11c6c8f6baba69ba4ed17a38730e84eb3_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:693a77a9324d6c7f0e69bd9d5725b51f3e429972f1e67469e93648cb347eae84_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:89757e804d5df2b5eeeb1191b599c3acb9e75f61170f888095302830d6de0582_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:8e45e1fd7342d7525b118f01794cac1f4a8662def5f2a06336b698db2e268742_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:ce1c17b34b7aac2e990dc0efe40f4406e73f727b2c7bfe109eded849de753f1a_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:728606d96dd9e0fc2e7810e092e10ee071ec36598c990c8252beccace59a679e_amd64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:b457d0b95d88c5dd0aac87492cbca40a9d7c2074002ad110f52d562f0c5d0797_arm64", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f34d2569033bfb1d173342264f090f46d80f7843d52704a7ce9e9eb9de2f5abb_s390x", "8Base-RHACM-2.6:rhacm2/acm-prometheus-rhel8@sha256:f720e0a94bfe7ed5d812819a3e77cc0581be102970127d8c0d4aa06a05edbf3d_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:17ccd6b924b36ab14e3ca5f5331ba7e4c86f8cb64304640d58c3ee6b76edbcaf_ppc64le", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27079308ea87e35564cc3089c65eae68d63880a3bb093ca64d1678a68b60fcec_amd64", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:9eabaac2df91aeef613d6973669d07298f2159c6a6e0c9f294623f7b1a10bc08_s390x", "8Base-RHACM-2.6:rhacm2/acm-volsync-addon-controller-rhel8@sha256:f7abdf1756bc0ff2ebf02fee0469a8b9eeabe1fa8cafdd21c6e8f958155b70bb_arm64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:017c1e663827a3b55d70badd3ed979b5d1831252c49d671897a85a75afaa5bb0_s390x", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:0610778095974edf936602018281bf7a5e287ba9eca9f661a423e68bbe000e40_ppc64le", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:a66d7d4ee1179f7fce639490f919d722db54eaa3118b4135078c33e6cbf91488_amd64", "8Base-RHACM-2.6:rhacm2/cert-policy-controller-rhel8@sha256:d660befef0c8f7a4db7aa3b865545c9863d8f37e7ba4b8de4380185f82b208d4_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:1a749d0795972a9bfd5a00aa96c238a660673464be01b2aa9fd7a3aeead6ddf7_amd64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:8915dbdc562e63441f79041bdf1176e46ce53e95418d133f0cd0c1ff79da48a2_arm64", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:995f225449b207da9a3cad175dac85b87eefb28ff5bae6a588f40fd79fbe12a1_ppc64le", "8Base-RHACM-2.6:rhacm2/cluster-backup-rhel8-operator@sha256:f1255a76c6275a4b6a400c82e204a5112fff6fe87f71626f8f309763f6a5d9e4_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:3b2e0d850e8fc966ec80bff16df26002334744a96b81c7a7dfe222f1706a52e3_s390x", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:447f275bbde46d7fc173798ef5abc0a77a6780f0dffdc171786edbe00f27d8d8_ppc64le", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:61964a1a0ddf2e98bcf5249b7374235055ab85cc26663a8d9397c2b7f6fbb4c6_amd64", "8Base-RHACM-2.6:rhacm2/config-policy-controller-rhel8@sha256:a3abaa3d0bf1d34fa9e40903a8713c439f5f7f751e775d32cbab308983064ce0_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:6c0f630ff57f6f423df6dbf4df9faad25089f9b391be35cb8bc9cd5211f94d67_arm64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:8608aed6971299def3fbe749336727e84c69582664dedac3145b92ea24e62e4d_amd64", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:afa80ae8274db7fa6796c35980fc5df15889e94aff3361f6cda643e5a09da220_ppc64le", "8Base-RHACM-2.6:rhacm2/console-rhel8@sha256:f06e4e3f62db52c6d7fa0bc1f289de773e18d076bc38612e1b0ddc85c76fde06_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:060bcd658756a924b4ce4d202bd447a3254fc1f49af7d685dde8720f355cde8e_arm64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:091d66731c5fe8eba5646c6b2622bb38c074e202a8a4a7e906921673b60f0898_amd64", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80660eb7f3c068768b0ea04ff20f4539194c52427ffdab4626bf781aa3f2ca64_s390x", "8Base-RHACM-2.6:rhacm2/endpoint-monitoring-rhel8-operator@sha256:d6204fcf04c83bac13232ec1602572ad5f22bb528537e591079dfa36152697ec_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:51be0f04938b60ed1dba60908bebd2000d78e4ade34757bae70a083c67d77e8e_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:9577701bf3c7aa00b99531d2c3842130abc6cd91c52c4a7ba040b705eeace4c7_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:bdc6c128628db86697af198430c5ae5c61c3e586c1a97187e4d4e852cec61e92_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-propagator-rhel8@sha256:cc519319b9f4fe672144ebedd772ddf56d5de90e3c8f52c0fb9b55313f71a7b3_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c1905ae8a83e5598678457fd955cbc867453ed5836de6fcc182e4928df8bd67_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:4a8d30cc0e1d83c69b7f3339418b101da23fbcaee7d326bedaff677eceb25ab2_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:6849cf1b4dd883d5b4c0cf90a3adfb26cb59d03d3b892cee3669a32dd6b8dcc2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-spec-sync-rhel8@sha256:d06ffc621167aff31ecb0fa417b294ff0676fb00e4ef1c6cb0fb2aaf4b2561e0_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:4c86e16f15aaf454e4e5ce5436e1db27a5f8a55f573c3eaf02e4786fe52edfc8_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:cf6a75d94f50dd063e939aee18756c767cba43f4e1e62a9c2f2b764ac6f43746_s390x", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:e072b615eeffff80a94831e58c70980684c1ec4bd972844b25b157eb7ed5937f_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-status-sync-rhel8@sha256:fffe971caa2e911d9c972c0e88712ff431d34c63dbe74e25f1cababa50ea7417_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:10bc1a3833599a593a058e804de67e92888ed779fd0000928d4a70b6c7d5c1c2_amd64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:5c17f979f47840a879059ad83de12f0756889564a17190ba4438a7632c999bb1_arm64", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:848bce8007de7714afc8c755b5f0c3cdf5eb6b1d259811c947bc295924539a0e_ppc64le", "8Base-RHACM-2.6:rhacm2/governance-policy-template-sync-rhel8@sha256:95439f7e18fa87601d5860cbd9ca5f0738786e30a629d23788fd5fe33d694c66_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:1f5c1b2cffebf069859e95d0e722cb293f8c176bf5c5873bb9517c96b26c2e10_arm64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:5223158a122658bafbd853c596cdc1f7bd7a0e4fdd82b1c3668ac84adeae9f24_s390x", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:561f1f05925cfe3c5f0f8a9b7475be4bbab183b5611ecfe09b090d80fa4bc2fe_amd64", "8Base-RHACM-2.6:rhacm2/grafana-dashboard-loader-rhel8@sha256:734270221ec4a516e7eb77f2ec3a753384242116aa70320a1dbe969e915af1df_ppc64le", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:2827e5f485213f92e2d0092187f3976dd6fe598e39b5cf2212d48c3a44c34b13_arm64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:8ca9e80365c76b66b2de3924fc50a5912e606042c704b02cb174a4b8bd3927c4_amd64", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:c5069e76a900aa300102a0ae54ecbc12c0ac31abfeed8656ee60a949daef79c3_s390x", "8Base-RHACM-2.6:rhacm2/iam-policy-controller-rhel8@sha256:ca05e79e5508924af71f323c13f664770d8dd4eb61ecf0894e4f9a81f7a1b402_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:02cacfec60c80b9228e8b18949751de867f974ea6b1172129096e64e949c0598_amd64", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:2b14036d0291e54c3191682de2ea875a78d78c35b2791a5a113ba1a8920f0621_ppc64le", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:d4c05f641de8fd0753d63cc6d5b62464d3d6a87d601514e87ef2e40bbe7b01b6_s390x", "8Base-RHACM-2.6:rhacm2/insights-client-rhel8@sha256:e15c410b693b34f49869d037ebb5584384fcdf88114b7a94967ca09f1361a5f3_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:67aa55bb65685395ad2773e7459dff5fbccdeedcf9e56ec2722d8f5c919eae89_s390x", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:6c54e08f5f6c2cae41a5e108e1019ff6522af8f69d666e22eb4631cd83b85917_amd64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:88d9b7246aa75cb2c88ccb7f2f1202fc465be0f2d89e59f1d2259f69ada56d9d_arm64", "8Base-RHACM-2.6:rhacm2/insights-metrics-rhel8@sha256:bad98fe71638d7346f31ea45f6063ec970bf90844bb5c5dc5f917bb0f0099899_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:22e510955af3fa736b7306c387f44b5f15f5f9a7a006c6587e06d5d8602cc2f0_s390x", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:55bc86326f992cc4f4401b93f90cdd2baa6728015ffaf6168f2d46ae43c70cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:8dd7f47af047fb899c7fcbad61cb8f38da45990cac186f9235aec3e4e7de25e9_amd64", "8Base-RHACM-2.6:rhacm2/klusterlet-addon-controller-rhel8@sha256:bdb97eb5bb0e8f59edf0d389fb07c45171e728dc8b4d2bdacd785193b46ec03b_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:11a353ee9da6cc843d5f346f4fa51681d13318e2e61fc4d1a3f63406eb175260_s390x", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:31757f3e3bb08b4e49e54694b18b3cf327637be20535482b2df1345b17444dda_amd64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:b2c0b7414d0fc36a49cbdc5a56b25dd62aac18defc2defbd9c1895cd13a5e716_arm64", "8Base-RHACM-2.6:rhacm2/kube-rbac-proxy-rhel8@sha256:dbd816d503e9beb58622604432eb415419e893627eb95c1ceeb8ff5bda7d6335_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:53246a6df1f0880d94ed2644fa4366e3e2108b6fa8a51745af87785346ce5304_s390x", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:5f2393bceefffb32240043b6722aa73d31fc8133cc2666fcf5eb8d33794bc54f_arm64", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:c792c043462281cde7c93bd8e2136f62ca17d072e7f466353f37de8e5f5dc949_ppc64le", "8Base-RHACM-2.6:rhacm2/kube-state-metrics-rhel8@sha256:e6b1d24b56e6973eee1569e351db6637ca67e1d6cd124adb845cbf6e35a4f6af_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:07238998d21204cd8f25dc63e6dbde20a2dd25c3b96609729306db6c63a0fca4_arm64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:0d2665d19a8753c6269f594b68b067cd62a402404287e6416543c1af2d7d3cf4_ppc64le", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:6917d018e53aabb6f5402f02000aedd2e5cf71bcc84562e0fc7d7c87049f4b67_amd64", "8Base-RHACM-2.6:rhacm2/management-ingress-rhel8@sha256:73b0444bd91a1dade3b7e76245ac8d6cb568929bba321b8c86c269d6f542ac3b_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:7d85dd62346a647d22202baa0f8d405b2aaf9a7174b38e5d29df2e03530009c3_s390x", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9635616c8f058e67d557201147904b05f8b49938f63fb2b0239dfca883f61685_arm64", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:9e91ecec92ec0df8b72beb6040f39d9a25b0bfad844e92ea34cc2d648d221d22_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-exporter-rhel8@sha256:c773b9a2fffcd549d4936054260f655c78da603957826d6bad4e8567a213ad10_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:584f8c4a9a1b75fc71948a98add560d4fe3d936ee46ac791f32121dbadf8c7d2_ppc64le", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:59b3ce3f3f4459c97cfffee5e20830d70f8a69198b5fab271e6c478d615c46d3_arm64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:6f458c76757203b28434f871027c6a466a73d246ceb5bfac8793ad1896a672ab_amd64", "8Base-RHACM-2.6:rhacm2/memcached-rhel8@sha256:e34722fd656e3205dcdb565b0ab68e9971174c11f125dbfff3bf82e1e21f3a76_s390x", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:3a81a018b939752543e78c2d68d1436b851be2256b88c3e66cd506ae1d8f4c9c_ppc64le", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:6a3e0c36c123c9dc54759655d9148f580abada501034914863a6528ded19ef34_amd64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:7991f484f97b9951f27f70e67d5db0850c4189ee86db8406cdda961a9beb06f0_arm64", "8Base-RHACM-2.6:rhacm2/metrics-collector-rhel8@sha256:fa08b9bf3fd334738984e150ba5bfd2e005374752f3112340b65f6434eacd057_s390x", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:2bcbf9a565f3c566061325aca3174ec755b5c94a28612718a3f1563db317273e_ppc64le", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:6813ccd43a1aecd1aaf4d5d4b1620fd63bbca00b736100189ff91246bf3bc36b_arm64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db89ef3686570526afdb2b79fd698aca5dc50c633009760f1748fb9fd506067b_amd64", "8Base-RHACM-2.6:rhacm2/multicloud-integrations-rhel8@sha256:db8bc27937802c5d8fff769b9c93c8a01411629d199adbc39235e721d6468b30_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:434db0ca203b14b899fff9b7a2a5b975de852ea29620a828f29246448aba873c_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:876bfa63b0e13833eaeadb7c6a0481f1d7970b283f69ece4d81c99985f4dd161_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:d23f208e020d42bc095011d423146e2da35b2bc85b844911bde2f4edf696bdca_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-observability-rhel8-operator@sha256:f29581baf5277588d2e4cd01380ecf46e3c97a2f17ade01b048f75c29f18d62c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:1952d422bd7ba42323711faba59244c449293cc92502e350460fee07c0e3b34a_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:566a60f630ec346eced3106ec072963d1b9f9d300e7d4cee6af6dc0d590a3937_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:724dd9f4a5e4acd061206ca2ea57c329210ade5135dbdf941b8d7e720daa4f10_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-application-rhel8@sha256:ace8895fc62c1394dfa7854fd9ce3e14ef859e989255f70dc9a5a3d9bcd514c0_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:1ebe6504a6a58f39f93952bf1c135ea58ff77e65c5b8ba73c7ad6295e66a1b45_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:557cc962d0b10d80a9dea7adce387ea28fb4199a02fa8546645ab2cacbf28b88_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:82526c7c046325bde1dfa0a47b58b773355f00bc95c23be75105e7255e7bddd2_arm64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-channel-rhel8@sha256:85e20d97f28e43668c2790bd6e0adbc598d01f9fab849761fb96d7a5c4946a87_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7310f31faae367a363c27a7236b562bbfe8381a352fce906279590bac11571d2_ppc64le", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:7676d33b9be36ca6660d3aed888fdffcf270fcf82258ed9531e2746a3d27610c_s390x", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:e718d5abef58365d547ef73828a26adff5b6cef1bf935aa7c27f12f604b50337_amd64", "8Base-RHACM-2.6:rhacm2/multicluster-operators-subscription-rhel8@sha256:f58aff87d1efb64417c6976f6772a464e54beefe847f50a141726b7a1a6a293a_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:03222a9dd6eca9cf44932a0ff1bf89bd9d2d29683f1ebb0d0aa49171b77a4963_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:881b8c3b19918affd478c0ad0c73dff96dd28f5c1dfddb86472b42e422fa25b6_amd64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:9de94ea1f83ec8b7257c7b2befc1485ed9cc40c9ef3600c4c4c50934e708cf9d_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-repo-rhel8@sha256:a45ed68e7d3ac89d17eaf06445cabfc19a9ce85a42f116d75028d6acd18a322b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:48d1fa8bc5f6a4d8349c41126301bd86d12836384f336881ecb71bd79f84ae93_ppc64le", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:a33e91fb763a2f0894433bce31bd44229e7d5f5c53d36c6b6f643807a45c110b_arm64", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:d6e126cbdd3cfbcdee04b093389ca1b07ac8038da96060051ed94e1eeacc6d92_s390x", "8Base-RHACM-2.6:rhacm2/multiclusterhub-rhel8@sha256:ecf12158a2d8802b4c7efd6b336ff36c1e002223b1d385a40fbef638d5e4aa21_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:14d23638efff3c30661c9a5f3ddb6ab0c7a9d162de1176dd9565cf49dfa4b9c5_amd64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:533005e1608de68a09e53599de3f30990db95cb923794bab9ae9e3bc1a8b6baf_arm64", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:99eef3491c7092afa14179b9a9d39dd8fbfb3c9bb61759d678af5d91ac23e59d_s390x", "8Base-RHACM-2.6:rhacm2/node-exporter-rhel8@sha256:e200d4e1802cce7fce32b1e0dc5c3220b6f6477b73b3a2d8ea26a5a42d63f46b_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:092e3437e6d38b2bf676d7fb67ad672e3ef03440017b5af7c1ebd2beb3f437eb_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:8cf076bfb049d1aabd00040ee65f0fedd590f0dd448c7561de494093a915b397_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:e69987a64fdbf873d4b19d8626c0c5e99dd13d7c95446850559be966dae45ad0_arm64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8-operator@sha256:f0bf89eaea6b7afc2d08c77bd40dfba581f91f462f5ec3d70473b332ca6f781c_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:0686cfddd61737f7e7eb4f0c011397277394559edac3bb947c0969e302686dd5_ppc64le", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:8f2f3732600235f66c406b6121ac37979f52572ce90353b6e099be7b74406251_amd64", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:9e1fccc5b17865a6d7baaa1a15cb50f47d80a14b0a7bcbd94c12f0ddcaaf1b28_s390x", "8Base-RHACM-2.6:rhacm2/observatorium-rhel8@sha256:bdd89a1051c8f21e7d81ff80c96731a0eaa7d15c320ab1e6b1dc3f6babd42598_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:0860b7aa5e8b07792ad7f5d5c0654e23e9da8eedd4b9f509caea616dcfa97d69_amd64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:624895d8579ef6f3e5b17558a30775790ec6f00701f8c5cdfa315292d7f9e867_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:6d09865a228cdbbc6d1ac13042c3c00f0bd086f6dc181dfa3cdf8c7f9d826b9e_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-alertmanager-rhel8@sha256:c69fee848d21346a271972e89d91898eac9fec27d598d98ffa004ca8d1b53270_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:52cea7c27de23e3358030b09f22b962723c523a940f8e2043edc298c907d761c_arm64", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:67e0fadfbb4d99a60435ed12b470772b38ace4ca815fe73da68eb3c826e200fc_ppc64le", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:e8241b1d852d605b44ecfcc552cb0f905f72e8a17c8d228162b40c19388f5176_s390x", "8Base-RHACM-2.6:rhacm2/prometheus-rhel8@sha256:ed0cc13e79949436d29a7ad0b41b189744a177ea27545fd5eb9b4f71e87bd0eb_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:29c76a37497f212aed280e2bf16ef45fb3785fb4649ce17b7fe9d653a79e2112_arm64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:475a45884a51127722030226ff9a5f0752c98574c41eb61796aece5e702346a3_ppc64le", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:582301b10af0b966ae7d5e130cb0e5f96e7912dc66b4108e0d6078656ca80604_amd64", "8Base-RHACM-2.6:rhacm2/rbac-query-proxy-rhel8@sha256:f1c7de85a44c03f48a6f62ba1d7d650f0b06e0f502cecff1512ad637b5bc1c27_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:128279a656bfbde6c2c052766d63a1de6a06d8bea2707813c64396c2ae382478_amd64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:35927ca6e6e9c8d420c499a0c8ad37c4297ba19743d550f489d3e66482275a49_arm64", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:4696baed553266682ba2b54d3bf683d2ff1241b625de5ec54a45c1b2c5f96243_s390x", "8Base-RHACM-2.6:rhacm2/redisgraph-tls-rhel8@sha256:d722f2ffab1f58bbaf3c62ef71dbf7e6c4023e6ab17690f1049075a321d0b1ac_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:2b5f372c1c73c4de587b5a4388d95b8cc553fc56af446fcefa0e14c6d980b6b3_ppc64le", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:38fceeedc0672def1c2cf42bb6743ae726e77d9f7352d002b3fc688c6d551852_amd64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:6a915335bcebb0884fc72df2dfee97c74d42c035864b960e1c800fa6c5f8d93c_arm64", "8Base-RHACM-2.6:rhacm2/search-aggregator-rhel8@sha256:752decaefc38aa009f54201b38d4ab26d9b4020caec649d9b1f1564f56c47c2a_s390x", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:37eea70d5b1c89c25372dcea8c8c03e1e0a9af1b5a06f3b0706ba776ae8847c1_amd64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:7400088d206592eb29cd86182909626262c9b2a99f017811fcc9d8a753c39009_arm64", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:aa8ea0deabc39a068f3f6ce9fa6334e44fc507355009a9bff448e742156ec203_ppc64le", "8Base-RHACM-2.6:rhacm2/search-api-rhel8@sha256:b4d2d39c2b3b736987f1e888b858d52a7ebd9f8d0cebd3bdef8c59f6e3e41725_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:0174699ec75fcda08892b4e72b674df989af51ea5f04de57a62c2a85a3c08f4f_arm64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:5a29a9805b8d20969cba86da11a9de8176a3172df361aec5fae136a4271de308_amd64", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:be7eed9ad9502bcc294081f7e2098fc4f8411c912c34fe63479b5b770d06caca_s390x", "8Base-RHACM-2.6:rhacm2/search-collector-rhel8@sha256:c467c1d7ceaf5281077f7fe8ff1c1c4cffe325132890a3ab9b96ea5db2e2c930_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:2135cd20bb7ebbf48499992fe46a928e28fc78c86e360633ea09054520c42539_ppc64le", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:3a7a31974210e21a3faed9b57a75b970c70ac41d9662b884d4ce67275f756fc7_arm64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:6e6a19f1440e4eb15a8206e18f7f4dde3e1a5c6518944571d09923d116d3f04e_amd64", "8Base-RHACM-2.6:rhacm2/search-rhel8@sha256:e6ed3e65f0d49b3c6b0e3e97593a8fae4d453f3aecf8d7829c0d25c68bc91ea1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:7b80d01371f551df506bd0c56df6829845bfce497ff01cc44b68f172ed5399b4_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:934c560bc786015c694e9cffbae8e86f631b3331d62f5a547931446dae82f8c3_s390x", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:b467881f4028a89a9e79ba93da719845db576f47a04ae6e569c2317be5594b29_arm64", "8Base-RHACM-2.6:rhacm2/submariner-addon-rhel8@sha256:fc5592d42e4aca70288448d174511b922ece7f8cb4b41c6a36195c3a4a60aa36_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:21f2626c10c4fb61b37e6ca4ab574186b423f155fbc5cfef3e894fff04cc270e_ppc64le", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:c357074958324fc5d602cdcf1cba285bf8582e0b36af79a8f6211bb0dfb77a10_amd64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:d9ac8e67d6d9858b16dd9d1d49c1dd904aa22a7b618e5d33292344faced9c0d3_arm64", "8Base-RHACM-2.6:rhacm2/thanos-receive-controller-rhel8@sha256:e3b840a7833680170f9e9ca52309552c584935a68c75cc71e6d576b104dc01c8_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:453c525197ccfe1f866af70ca2e7f3deb6f98d0b98c09b602b4fa1368787213d_amd64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:4b3b45ad0b564360c245d20b1540c2398c9606cf8684275e4ee071c591357929_arm64", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:7e43ba8f47ec54b5f86d13c81b67b044176530b63b5ae3f40332fc975cc6b21f_s390x", "8Base-RHACM-2.6:rhacm2/thanos-rhel8@sha256:faaa00c0af80c781a7c610616153a3cd1dc1b20637934c3a243a2e9664ba0ee5_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working" } ] }
rhsa-2022_5915
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Kiali for OpenShift Service Mesh 2.2 Containers\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Kiali for OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThis advisory covers containers for the release.\n\nSecurity Fix(es):\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5915", "url": "https://access.redhat.com/errata/RHSA-2022:5915" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "OSSM-1821", "url": "https://issues.redhat.com/browse/OSSM-1821" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5915.json" } ], "title": "Red Hat Security Advisory: Red Hat Kiali for OpenShift Service Mesh 2.2 security update", "tracking": { "current_release_date": "2024-12-18T00:34:59+00:00", "generator": { "date": "2024-12-18T00:34:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5915", "initial_release_date": "2022-08-08T08:47:11+00:00", "revision_history": [ { "date": "2022-08-08T08:47:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-08T08:47:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:34:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHOSSM 2.2 for RHEL 8", "product": { "name": "RHOSSM 2.2 for RHEL 8", "product_id": "8Base-RHOSSM-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.2::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:0b257ea1f093cc346c29d28cc76042b8548960bc82828bbec32b2ef6bcc67748_amd64", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:0b257ea1f093cc346c29d28cc76042b8548960bc82828bbec32b2ef6bcc67748_amd64", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:0b257ea1f093cc346c29d28cc76042b8548960bc82828bbec32b2ef6bcc67748_amd64", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:0b257ea1f093cc346c29d28cc76042b8548960bc82828bbec32b2ef6bcc67748?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.48.2-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:aa2454a64464f37228ec6126198d1bcd535912cbaecdae3fa6a19ec204d3006a_amd64", "product": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:aa2454a64464f37228ec6126198d1bcd535912cbaecdae3fa6a19ec204d3006a_amd64", "product_id": "openshift-service-mesh/kiali-rhel8-operator@sha256:aa2454a64464f37228ec6126198d1bcd535912cbaecdae3fa6a19ec204d3006a_amd64", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8-operator@sha256:aa2454a64464f37228ec6126198d1bcd535912cbaecdae3fa6a19ec204d3006a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8-operator\u0026tag=1.48.2-1" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:bb40e220b9433a6cf6dfbd5ac1c2555cf15c27550eb1760da52a12d8c1296fcc_s390x", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:bb40e220b9433a6cf6dfbd5ac1c2555cf15c27550eb1760da52a12d8c1296fcc_s390x", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:bb40e220b9433a6cf6dfbd5ac1c2555cf15c27550eb1760da52a12d8c1296fcc_s390x", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:bb40e220b9433a6cf6dfbd5ac1c2555cf15c27550eb1760da52a12d8c1296fcc?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.48.2-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:e93f3dac95c43b23146602659e7fa787851194d58452a2164b772e85501d3e14_s390x", "product": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:e93f3dac95c43b23146602659e7fa787851194d58452a2164b772e85501d3e14_s390x", "product_id": "openshift-service-mesh/kiali-rhel8-operator@sha256:e93f3dac95c43b23146602659e7fa787851194d58452a2164b772e85501d3e14_s390x", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8-operator@sha256:e93f3dac95c43b23146602659e7fa787851194d58452a2164b772e85501d3e14?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8-operator\u0026tag=1.48.2-1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:24710c5393e55e60cdb647cae8339bdba54a2fb6f06bfa311e4a89786157525a_ppc64le", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:24710c5393e55e60cdb647cae8339bdba54a2fb6f06bfa311e4a89786157525a_ppc64le", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:24710c5393e55e60cdb647cae8339bdba54a2fb6f06bfa311e4a89786157525a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:24710c5393e55e60cdb647cae8339bdba54a2fb6f06bfa311e4a89786157525a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.48.2-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:2b32520bb29e7c80e3cd74b2f330480916542776add6b0cfdf10ab63b4d73f8c_ppc64le", "product": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:2b32520bb29e7c80e3cd74b2f330480916542776add6b0cfdf10ab63b4d73f8c_ppc64le", "product_id": "openshift-service-mesh/kiali-rhel8-operator@sha256:2b32520bb29e7c80e3cd74b2f330480916542776add6b0cfdf10ab63b4d73f8c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8-operator@sha256:2b32520bb29e7c80e3cd74b2f330480916542776add6b0cfdf10ab63b4d73f8c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8-operator\u0026tag=1.48.2-1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:2b32520bb29e7c80e3cd74b2f330480916542776add6b0cfdf10ab63b4d73f8c_ppc64le as a component of RHOSSM 2.2 for RHEL 8", "product_id": "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:2b32520bb29e7c80e3cd74b2f330480916542776add6b0cfdf10ab63b4d73f8c_ppc64le" }, "product_reference": "openshift-service-mesh/kiali-rhel8-operator@sha256:2b32520bb29e7c80e3cd74b2f330480916542776add6b0cfdf10ab63b4d73f8c_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:aa2454a64464f37228ec6126198d1bcd535912cbaecdae3fa6a19ec204d3006a_amd64 as a component of RHOSSM 2.2 for RHEL 8", "product_id": "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:aa2454a64464f37228ec6126198d1bcd535912cbaecdae3fa6a19ec204d3006a_amd64" }, "product_reference": "openshift-service-mesh/kiali-rhel8-operator@sha256:aa2454a64464f37228ec6126198d1bcd535912cbaecdae3fa6a19ec204d3006a_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:e93f3dac95c43b23146602659e7fa787851194d58452a2164b772e85501d3e14_s390x as a component of RHOSSM 2.2 for RHEL 8", "product_id": "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:e93f3dac95c43b23146602659e7fa787851194d58452a2164b772e85501d3e14_s390x" }, "product_reference": "openshift-service-mesh/kiali-rhel8-operator@sha256:e93f3dac95c43b23146602659e7fa787851194d58452a2164b772e85501d3e14_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:0b257ea1f093cc346c29d28cc76042b8548960bc82828bbec32b2ef6bcc67748_amd64 as a component of RHOSSM 2.2 for RHEL 8", "product_id": "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:0b257ea1f093cc346c29d28cc76042b8548960bc82828bbec32b2ef6bcc67748_amd64" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:0b257ea1f093cc346c29d28cc76042b8548960bc82828bbec32b2ef6bcc67748_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:24710c5393e55e60cdb647cae8339bdba54a2fb6f06bfa311e4a89786157525a_ppc64le as a component of RHOSSM 2.2 for RHEL 8", "product_id": "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:24710c5393e55e60cdb647cae8339bdba54a2fb6f06bfa311e4a89786157525a_ppc64le" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:24710c5393e55e60cdb647cae8339bdba54a2fb6f06bfa311e4a89786157525a_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:bb40e220b9433a6cf6dfbd5ac1c2555cf15c27550eb1760da52a12d8c1296fcc_s390x as a component of RHOSSM 2.2 for RHEL 8", "product_id": "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:bb40e220b9433a6cf6dfbd5ac1c2555cf15c27550eb1760da52a12d8c1296fcc_s390x" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:bb40e220b9433a6cf6dfbd5ac1c2555cf15c27550eb1760da52a12d8c1296fcc_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:2b32520bb29e7c80e3cd74b2f330480916542776add6b0cfdf10ab63b4d73f8c_ppc64le", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:aa2454a64464f37228ec6126198d1bcd535912cbaecdae3fa6a19ec204d3006a_amd64", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:e93f3dac95c43b23146602659e7fa787851194d58452a2164b772e85501d3e14_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:0b257ea1f093cc346c29d28cc76042b8548960bc82828bbec32b2ef6bcc67748_amd64", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:24710c5393e55e60cdb647cae8339bdba54a2fb6f06bfa311e4a89786157525a_ppc64le", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:bb40e220b9433a6cf6dfbd5ac1c2555cf15c27550eb1760da52a12d8c1296fcc_s390x" ], "known_not_affected": [ "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:2b32520bb29e7c80e3cd74b2f330480916542776add6b0cfdf10ab63b4d73f8c_ppc64le", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:aa2454a64464f37228ec6126198d1bcd535912cbaecdae3fa6a19ec204d3006a_amd64", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:e93f3dac95c43b23146602659e7fa787851194d58452a2164b772e85501d3e14_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-08T08:47:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:0b257ea1f093cc346c29d28cc76042b8548960bc82828bbec32b2ef6bcc67748_amd64", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:24710c5393e55e60cdb647cae8339bdba54a2fb6f06bfa311e4a89786157525a_ppc64le", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:bb40e220b9433a6cf6dfbd5ac1c2555cf15c27550eb1760da52a12d8c1296fcc_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5915" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:2b32520bb29e7c80e3cd74b2f330480916542776add6b0cfdf10ab63b4d73f8c_ppc64le", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:aa2454a64464f37228ec6126198d1bcd535912cbaecdae3fa6a19ec204d3006a_amd64", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8-operator@sha256:e93f3dac95c43b23146602659e7fa787851194d58452a2164b772e85501d3e14_s390x", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:0b257ea1f093cc346c29d28cc76042b8548960bc82828bbec32b2ef6bcc67748_amd64", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:24710c5393e55e60cdb647cae8339bdba54a2fb6f06bfa311e4a89786157525a_ppc64le", "8Base-RHOSSM-2.2:openshift-service-mesh/kiali-rhel8@sha256:bb40e220b9433a6cf6dfbd5ac1c2555cf15c27550eb1760da52a12d8c1296fcc_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_6271
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General\nAvailability release images, which provide security updates and bug fixes.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.3.12 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs. See the following\nRelease Notes documentation, which will be updated shortly for this\nrelease, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/\n\nSecurity fix:\n\n* CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS\n\nBug fixes:\n\n* Remove 1.9.1 from Proxy Patch Documentation (BZ# 2076856)\n\n* RHACM 2.3.12 images (BZ# 2101411)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6271", "url": "https://access.redhat.com/errata/RHSA-2022:6271" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2076856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076856" }, { "category": "external", "summary": "2101411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101411" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6271.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.12 security updates and bug fixes", "tracking": { "current_release_date": "2024-12-18T00:35:23+00:00", "generator": { "date": "2024-12-18T00:35:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6271", "initial_release_date": "2022-08-31T14:25:25+00:00", "revision_history": [ { "date": "2022-08-31T14:25:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-31T14:25:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:35:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.3::el8" } } }, { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7", "product_id": "7Server-RHACM-2.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.3::el7" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:9725c9180f597eb6615404f672ffeecd04f639cfd3c6097d91bb6ff636efb0d2_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:9725c9180f597eb6615404f672ffeecd04f639cfd3c6097d91bb6ff636efb0d2_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:9725c9180f597eb6615404f672ffeecd04f639cfd3c6097d91bb6ff636efb0d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:9725c9180f597eb6615404f672ffeecd04f639cfd3c6097d91bb6ff636efb0d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:800f487f71b2d65361af1b86bdd054643718321098cbecf0789717105394a6af_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:800f487f71b2d65361af1b86bdd054643718321098cbecf0789717105394a6af_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:800f487f71b2d65361af1b86bdd054643718321098cbecf0789717105394a6af_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:800f487f71b2d65361af1b86bdd054643718321098cbecf0789717105394a6af?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:a45e23fdcfa02c1841152e352f58aea50c359ff442d3d3896e9ae0280996ba99_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:a45e23fdcfa02c1841152e352f58aea50c359ff442d3d3896e9ae0280996ba99_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:a45e23fdcfa02c1841152e352f58aea50c359ff442d3d3896e9ae0280996ba99_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:a45e23fdcfa02c1841152e352f58aea50c359ff442d3d3896e9ae0280996ba99?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.3.12-12" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:3224179c171ba87c58ad417a94443fcea0b0619aa8f4b970825cad44e534a347_ppc64le", "product": { "name": "rhacm2/application-ui-rhel8@sha256:3224179c171ba87c58ad417a94443fcea0b0619aa8f4b970825cad44e534a347_ppc64le", "product_id": "rhacm2/application-ui-rhel8@sha256:3224179c171ba87c58ad417a94443fcea0b0619aa8f4b970825cad44e534a347_ppc64le", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:3224179c171ba87c58ad417a94443fcea0b0619aa8f4b970825cad44e534a347?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:6d1fe4fad43f7f1321f87ed456716f41bb1b24eb00fd66f9758152b566b168c6_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:6d1fe4fad43f7f1321f87ed456716f41bb1b24eb00fd66f9758152b566b168c6_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:6d1fe4fad43f7f1321f87ed456716f41bb1b24eb00fd66f9758152b566b168c6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:6d1fe4fad43f7f1321f87ed456716f41bb1b24eb00fd66f9758152b566b168c6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:bb88a0bf65a8b938bd0ebdbebdae79be60f0ecc4f4a69025e2ffee17154dda6e_ppc64le", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:bb88a0bf65a8b938bd0ebdbebdae79be60f0ecc4f4a69025e2ffee17154dda6e_ppc64le", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:bb88a0bf65a8b938bd0ebdbebdae79be60f0ecc4f4a69025e2ffee17154dda6e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:bb88a0bf65a8b938bd0ebdbebdae79be60f0ecc4f4a69025e2ffee17154dda6e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e3057346b858ce63922b46f8bcbca952cf83e66db24ab1f137a8fb1378795a8_ppc64le", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e3057346b858ce63922b46f8bcbca952cf83e66db24ab1f137a8fb1378795a8_ppc64le", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e3057346b858ce63922b46f8bcbca952cf83e66db24ab1f137a8fb1378795a8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:7e3057346b858ce63922b46f8bcbca952cf83e66db24ab1f137a8fb1378795a8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:c5772c181334a58c44dff660be5feede0b08f6bfce5e5ab9bc59117db40e10ef_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:c5772c181334a58c44dff660be5feede0b08f6bfce5e5ab9bc59117db40e10ef_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:c5772c181334a58c44dff660be5feede0b08f6bfce5e5ab9bc59117db40e10ef_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:c5772c181334a58c44dff660be5feede0b08f6bfce5e5ab9bc59117db40e10ef?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:03099e106fe591e230f5ff47a90ce9e475575b4cd32f16fdd230e70c65128e77_ppc64le", "product": { "name": "rhacm2/console-api-rhel8@sha256:03099e106fe591e230f5ff47a90ce9e475575b4cd32f16fdd230e70c65128e77_ppc64le", "product_id": "rhacm2/console-api-rhel8@sha256:03099e106fe591e230f5ff47a90ce9e475575b4cd32f16fdd230e70c65128e77_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:03099e106fe591e230f5ff47a90ce9e475575b4cd32f16fdd230e70c65128e77?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:e93a19a6c0db798b328d7d921870dc597a90f3b829ce481b6cae952289da19b0_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:e93a19a6c0db798b328d7d921870dc597a90f3b829ce481b6cae952289da19b0_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:e93a19a6c0db798b328d7d921870dc597a90f3b829ce481b6cae952289da19b0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:e93a19a6c0db798b328d7d921870dc597a90f3b829ce481b6cae952289da19b0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:219c952dcb29b569ccb1d318a73cd08d0c5f55e20000b4a852f5454b18dd8aa5_ppc64le", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:219c952dcb29b569ccb1d318a73cd08d0c5f55e20000b4a852f5454b18dd8aa5_ppc64le", "product_id": "rhacm2/discovery-rhel8-operator@sha256:219c952dcb29b569ccb1d318a73cd08d0c5f55e20000b4a852f5454b18dd8aa5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:219c952dcb29b569ccb1d318a73cd08d0c5f55e20000b4a852f5454b18dd8aa5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:3e6b3b09fe10fff48cd4de7e4de95d68c460e51019f25f4523339e0eda028eec_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:3e6b3b09fe10fff48cd4de7e4de95d68c460e51019f25f4523339e0eda028eec_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:3e6b3b09fe10fff48cd4de7e4de95d68c460e51019f25f4523339e0eda028eec_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:3e6b3b09fe10fff48cd4de7e4de95d68c460e51019f25f4523339e0eda028eec?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:f4f6a958f47633afc47cb92349e9fdf653b052a4f84106f3f06ff590071e47f5_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:f4f6a958f47633afc47cb92349e9fdf653b052a4f84106f3f06ff590071e47f5_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:f4f6a958f47633afc47cb92349e9fdf653b052a4f84106f3f06ff590071e47f5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:f4f6a958f47633afc47cb92349e9fdf653b052a4f84106f3f06ff590071e47f5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:987f8b16c73bbdb4633118aaf88df560bced0f98e958a6b0359789adecc17274_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:987f8b16c73bbdb4633118aaf88df560bced0f98e958a6b0359789adecc17274_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:987f8b16c73bbdb4633118aaf88df560bced0f98e958a6b0359789adecc17274_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:987f8b16c73bbdb4633118aaf88df560bced0f98e958a6b0359789adecc17274?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:c4a5f9877fe1aadac666ee57737dc9c06d3281c8296f41ece7d4cbbca35b5760_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:c4a5f9877fe1aadac666ee57737dc9c06d3281c8296f41ece7d4cbbca35b5760_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:c4a5f9877fe1aadac666ee57737dc9c06d3281c8296f41ece7d4cbbca35b5760_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:c4a5f9877fe1aadac666ee57737dc9c06d3281c8296f41ece7d4cbbca35b5760?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:e68013d7277592ed091338ba470c84290b7e5f6fe5f72611d5368ec6759fb9ba_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:e68013d7277592ed091338ba470c84290b7e5f6fe5f72611d5368ec6759fb9ba_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:e68013d7277592ed091338ba470c84290b7e5f6fe5f72611d5368ec6759fb9ba_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:e68013d7277592ed091338ba470c84290b7e5f6fe5f72611d5368ec6759fb9ba?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:719492a71598de1c02b90ece7e0205d29e51e4d1422b578f1ab1de6df2c51f31_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:719492a71598de1c02b90ece7e0205d29e51e4d1422b578f1ab1de6df2c51f31_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:719492a71598de1c02b90ece7e0205d29e51e4d1422b578f1ab1de6df2c51f31_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:719492a71598de1c02b90ece7e0205d29e51e4d1422b578f1ab1de6df2c51f31?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:b7c7b8188a428be1e3fdcf999a5383ff01ce5f62952b4bce115160109bd535b7_ppc64le", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:b7c7b8188a428be1e3fdcf999a5383ff01ce5f62952b4bce115160109bd535b7_ppc64le", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:b7c7b8188a428be1e3fdcf999a5383ff01ce5f62952b4bce115160109bd535b7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:b7c7b8188a428be1e3fdcf999a5383ff01ce5f62952b4bce115160109bd535b7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:c8ab69260af4bb6de5704478f642309c8aa9e2acd54c5b1523403e4ac2e6e3ba_ppc64le", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:c8ab69260af4bb6de5704478f642309c8aa9e2acd54c5b1523403e4ac2e6e3ba_ppc64le", "product_id": "rhacm2/grc-ui-rhel8@sha256:c8ab69260af4bb6de5704478f642309c8aa9e2acd54c5b1523403e4ac2e6e3ba_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:c8ab69260af4bb6de5704478f642309c8aa9e2acd54c5b1523403e4ac2e6e3ba?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:d837fb83dfca6fcb7313810861539ca5885e3a0f47e924f7dbb979cea63c40be_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:d837fb83dfca6fcb7313810861539ca5885e3a0f47e924f7dbb979cea63c40be_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:d837fb83dfca6fcb7313810861539ca5885e3a0f47e924f7dbb979cea63c40be_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:d837fb83dfca6fcb7313810861539ca5885e3a0f47e924f7dbb979cea63c40be?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:6a98f068ff319a152ed9f9219b8d10f1fb2ba51dbf7df816a39ddf1b848544f9_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:6a98f068ff319a152ed9f9219b8d10f1fb2ba51dbf7df816a39ddf1b848544f9_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:6a98f068ff319a152ed9f9219b8d10f1fb2ba51dbf7df816a39ddf1b848544f9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:6a98f068ff319a152ed9f9219b8d10f1fb2ba51dbf7df816a39ddf1b848544f9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:d14c9d35c3cf30a852d3a797527af5a8934ba244be03672f21cd50279fe5224c_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:d14c9d35c3cf30a852d3a797527af5a8934ba244be03672f21cd50279fe5224c_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:d14c9d35c3cf30a852d3a797527af5a8934ba244be03672f21cd50279fe5224c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:d14c9d35c3cf30a852d3a797527af5a8934ba244be03672f21cd50279fe5224c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:c5660dcdf2383e3eab04388f7ef304390da4d6c936cd205d1bd6d9106b64750e_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:c5660dcdf2383e3eab04388f7ef304390da4d6c936cd205d1bd6d9106b64750e_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:c5660dcdf2383e3eab04388f7ef304390da4d6c936cd205d1bd6d9106b64750e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:c5660dcdf2383e3eab04388f7ef304390da4d6c936cd205d1bd6d9106b64750e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:3b941671138970358867ef95af1c9060e0b14b9918304ed228f1af0c64e32b7f_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:3b941671138970358867ef95af1c9060e0b14b9918304ed228f1af0c64e32b7f_ppc64le", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:3b941671138970358867ef95af1c9060e0b14b9918304ed228f1af0c64e32b7f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:3b941671138970358867ef95af1c9060e0b14b9918304ed228f1af0c64e32b7f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/kui-web-terminal-rhel8@sha256:f0e10c0fd8fd63d63e4bd77737570dddd8411b222c48a768233d3efcd68db540_ppc64le", "product": { "name": "rhacm2/kui-web-terminal-rhel8@sha256:f0e10c0fd8fd63d63e4bd77737570dddd8411b222c48a768233d3efcd68db540_ppc64le", "product_id": "rhacm2/kui-web-terminal-rhel8@sha256:f0e10c0fd8fd63d63e4bd77737570dddd8411b222c48a768233d3efcd68db540_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kui-web-terminal-rhel8@sha256:f0e10c0fd8fd63d63e4bd77737570dddd8411b222c48a768233d3efcd68db540?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kui-web-terminal-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:21637cf2186a93bdbab90daeb0454bf8a100822ec349bed411636d914c702248_ppc64le", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:21637cf2186a93bdbab90daeb0454bf8a100822ec349bed411636d914c702248_ppc64le", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:21637cf2186a93bdbab90daeb0454bf8a100822ec349bed411636d914c702248_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:21637cf2186a93bdbab90daeb0454bf8a100822ec349bed411636d914c702248?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel7@sha256:b798d8f17236c6a809377d1dbc14e76686919986ed8ea4035629c7dcfeea9a14_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel7@sha256:b798d8f17236c6a809377d1dbc14e76686919986ed8ea4035629c7dcfeea9a14_ppc64le", "product_id": "rhacm2/management-ingress-rhel7@sha256:b798d8f17236c6a809377d1dbc14e76686919986ed8ea4035629c7dcfeea9a14_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel7@sha256:b798d8f17236c6a809377d1dbc14e76686919986ed8ea4035629c7dcfeea9a14?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel7\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:34a257ffa28c71140baf1582dff07e021cd332e63c0787dfa3e807f1abbc9cbc_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:34a257ffa28c71140baf1582dff07e021cd332e63c0787dfa3e807f1abbc9cbc_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:34a257ffa28c71140baf1582dff07e021cd332e63c0787dfa3e807f1abbc9cbc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:34a257ffa28c71140baf1582dff07e021cd332e63c0787dfa3e807f1abbc9cbc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel7@sha256:88e14f3bd185d0158ead6bd41f1805320b55ed55a7ab7cb823418bbb075c1fe7_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel7@sha256:88e14f3bd185d0158ead6bd41f1805320b55ed55a7ab7cb823418bbb075c1fe7_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel7@sha256:88e14f3bd185d0158ead6bd41f1805320b55ed55a7ab7cb823418bbb075c1fe7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel7@sha256:88e14f3bd185d0158ead6bd41f1805320b55ed55a7ab7cb823418bbb075c1fe7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel7\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:6349b661ed0a32f147234448493bf9e8b9193b8e286aca85ea419893992d72ae_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:6349b661ed0a32f147234448493bf9e8b9193b8e286aca85ea419893992d72ae_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:6349b661ed0a32f147234448493bf9e8b9193b8e286aca85ea419893992d72ae_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:6349b661ed0a32f147234448493bf9e8b9193b8e286aca85ea419893992d72ae?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:c9a5defd921604b3afd2ebcb81ac565812b2bf49f69365f8b0d5debad355bdae_ppc64le", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c9a5defd921604b3afd2ebcb81ac565812b2bf49f69365f8b0d5debad355bdae_ppc64le", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:c9a5defd921604b3afd2ebcb81ac565812b2bf49f69365f8b0d5debad355bdae_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:c9a5defd921604b3afd2ebcb81ac565812b2bf49f69365f8b0d5debad355bdae?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:fa1eb816f320fc99d3c6031bcd59edc0e437fdf0d86c48f89c3101aaaff49550_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:fa1eb816f320fc99d3c6031bcd59edc0e437fdf0d86c48f89c3101aaaff49550_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:fa1eb816f320fc99d3c6031bcd59edc0e437fdf0d86c48f89c3101aaaff49550_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:fa1eb816f320fc99d3c6031bcd59edc0e437fdf0d86c48f89c3101aaaff49550?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:7303d028baf414e8fc48e5148d8fdd7ee799f0400dbdd8c91fb6c2031ca1485f_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:7303d028baf414e8fc48e5148d8fdd7ee799f0400dbdd8c91fb6c2031ca1485f_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:7303d028baf414e8fc48e5148d8fdd7ee799f0400dbdd8c91fb6c2031ca1485f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:7303d028baf414e8fc48e5148d8fdd7ee799f0400dbdd8c91fb6c2031ca1485f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:5ba5a496e3d16db90aede1e74cc168fb2f13f665059e0d626a99f8370cfd70de_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:5ba5a496e3d16db90aede1e74cc168fb2f13f665059e0d626a99f8370cfd70de_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:5ba5a496e3d16db90aede1e74cc168fb2f13f665059e0d626a99f8370cfd70de_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:5ba5a496e3d16db90aede1e74cc168fb2f13f665059e0d626a99f8370cfd70de?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:07c40c41d834d71fe6fcc08ef891dfcbcdafa801d8ee26c4a315b3c7d4c71349_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:07c40c41d834d71fe6fcc08ef891dfcbcdafa801d8ee26c4a315b3c7d4c71349_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:07c40c41d834d71fe6fcc08ef891dfcbcdafa801d8ee26c4a315b3c7d4c71349_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:07c40c41d834d71fe6fcc08ef891dfcbcdafa801d8ee26c4a315b3c7d4c71349?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:bc69edc5133bb46357f6b46c25f36653fd42de9740a2cced7aea10e34b2f0cc8_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:bc69edc5133bb46357f6b46c25f36653fd42de9740a2cced7aea10e34b2f0cc8_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:bc69edc5133bb46357f6b46c25f36653fd42de9740a2cced7aea10e34b2f0cc8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:bc69edc5133bb46357f6b46c25f36653fd42de9740a2cced7aea10e34b2f0cc8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:f681193db52645128b8e13bc087ad812b7d803f52421c4447ec4895fd86d948c_ppc64le", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:f681193db52645128b8e13bc087ad812b7d803f52421c4447ec4895fd86d948c_ppc64le", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:f681193db52645128b8e13bc087ad812b7d803f52421c4447ec4895fd86d948c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:f681193db52645128b8e13bc087ad812b7d803f52421c4447ec4895fd86d948c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:b6e66db32fcea05aee763785890e0828b64fd855c0c39b07cfdbdf9567983c2a_ppc64le", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:b6e66db32fcea05aee763785890e0828b64fd855c0c39b07cfdbdf9567983c2a_ppc64le", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:b6e66db32fcea05aee763785890e0828b64fd855c0c39b07cfdbdf9567983c2a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:b6e66db32fcea05aee763785890e0828b64fd855c0c39b07cfdbdf9567983c2a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:8b803d2a406e26190f270372472d4b8a4f8f79e683b1f1ed0c7bc35bf6751f09_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:8b803d2a406e26190f270372472d4b8a4f8f79e683b1f1ed0c7bc35bf6751f09_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:8b803d2a406e26190f270372472d4b8a4f8f79e683b1f1ed0c7bc35bf6751f09_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:8b803d2a406e26190f270372472d4b8a4f8f79e683b1f1ed0c7bc35bf6751f09?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:b276453aeba8606b708738a00ae1a8aa637140e350aaed25a512eb908e9a3141_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:b276453aeba8606b708738a00ae1a8aa637140e350aaed25a512eb908e9a3141_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:b276453aeba8606b708738a00ae1a8aa637140e350aaed25a512eb908e9a3141_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:b276453aeba8606b708738a00ae1a8aa637140e350aaed25a512eb908e9a3141?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:0d8cf3c46573bc0c9db2f72e18b7692c5d537a8171b6e7a2f0c6416c001fe0b9_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:0d8cf3c46573bc0c9db2f72e18b7692c5d537a8171b6e7a2f0c6416c001fe0b9_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:0d8cf3c46573bc0c9db2f72e18b7692c5d537a8171b6e7a2f0c6416c001fe0b9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:0d8cf3c46573bc0c9db2f72e18b7692c5d537a8171b6e7a2f0c6416c001fe0b9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:ffcaa9f390631225ddcbe349936193130c148c5c7040ee7a7d61dc94c3193bca_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:ffcaa9f390631225ddcbe349936193130c148c5c7040ee7a7d61dc94c3193bca_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:ffcaa9f390631225ddcbe349936193130c148c5c7040ee7a7d61dc94c3193bca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:ffcaa9f390631225ddcbe349936193130c148c5c7040ee7a7d61dc94c3193bca?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:02ea2b7e846d88c228dfbf2af479255fa50ddfd06ed572449fddeba6226a0258_ppc64le", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:02ea2b7e846d88c228dfbf2af479255fa50ddfd06ed572449fddeba6226a0258_ppc64le", "product_id": "rhacm2/openshift-hive-rhel8@sha256:02ea2b7e846d88c228dfbf2af479255fa50ddfd06ed572449fddeba6226a0258_ppc64le", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:02ea2b7e846d88c228dfbf2af479255fa50ddfd06ed572449fddeba6226a0258?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:013c92ba798deafdb3d66528be5c8a5eebd3512c5a2c31940748b2de410875dc_ppc64le", "product": { "name": "rhacm2/placement-rhel8@sha256:013c92ba798deafdb3d66528be5c8a5eebd3512c5a2c31940748b2de410875dc_ppc64le", "product_id": "rhacm2/placement-rhel8@sha256:013c92ba798deafdb3d66528be5c8a5eebd3512c5a2c31940748b2de410875dc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:013c92ba798deafdb3d66528be5c8a5eebd3512c5a2c31940748b2de410875dc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1c9e96a2e4a9e405abc29321e34d7492496f61089d63ccb5ac75967f5985591f_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1c9e96a2e4a9e405abc29321e34d7492496f61089d63ccb5ac75967f5985591f_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:1c9e96a2e4a9e405abc29321e34d7492496f61089d63ccb5ac75967f5985591f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:1c9e96a2e4a9e405abc29321e34d7492496f61089d63ccb5ac75967f5985591f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:dd3c6ddd835f225e3ccc3414bb7246d39585d2096953edf7b8773fd786c9cb85_ppc64le", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:dd3c6ddd835f225e3ccc3414bb7246d39585d2096953edf7b8773fd786c9cb85_ppc64le", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:dd3c6ddd835f225e3ccc3414bb7246d39585d2096953edf7b8773fd786c9cb85_ppc64le", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:dd3c6ddd835f225e3ccc3414bb7246d39585d2096953edf7b8773fd786c9cb85?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:34d3ea3226d97490b760c562ea94c26d0e575f715f2e571f93fe07e0b67a70cd_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:34d3ea3226d97490b760c562ea94c26d0e575f715f2e571f93fe07e0b67a70cd_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:34d3ea3226d97490b760c562ea94c26d0e575f715f2e571f93fe07e0b67a70cd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:34d3ea3226d97490b760c562ea94c26d0e575f715f2e571f93fe07e0b67a70cd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:a8dfa37c8980b40494101473e7c0f808e04245e34cd2b4fdd6e0f70a713e8d37_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:a8dfa37c8980b40494101473e7c0f808e04245e34cd2b4fdd6e0f70a713e8d37_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:a8dfa37c8980b40494101473e7c0f808e04245e34cd2b4fdd6e0f70a713e8d37_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:a8dfa37c8980b40494101473e7c0f808e04245e34cd2b4fdd6e0f70a713e8d37?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:1fc0c751515605fb9930fb053d5b596626bf97a818a218bab4a6afe8296ddd12_ppc64le", "product": { "name": "rhacm2/registration-rhel8@sha256:1fc0c751515605fb9930fb053d5b596626bf97a818a218bab4a6afe8296ddd12_ppc64le", "product_id": "rhacm2/registration-rhel8@sha256:1fc0c751515605fb9930fb053d5b596626bf97a818a218bab4a6afe8296ddd12_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:1fc0c751515605fb9930fb053d5b596626bf97a818a218bab4a6afe8296ddd12?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:95949eaaa1588e3c67d580ac91e5baf046074f90497d629f0a0b5cb59ee6605c_ppc64le", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:95949eaaa1588e3c67d580ac91e5baf046074f90497d629f0a0b5cb59ee6605c_ppc64le", "product_id": "rhacm2/registration-rhel8-operator@sha256:95949eaaa1588e3c67d580ac91e5baf046074f90497d629f0a0b5cb59ee6605c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:95949eaaa1588e3c67d580ac91e5baf046074f90497d629f0a0b5cb59ee6605c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:9e13b8a4610b11815be84028bf7de9355f75402699d6f1b6cbb4a98cbaacfe41_ppc64le", "product": { "name": "rhacm2/agent-service-rhel8@sha256:9e13b8a4610b11815be84028bf7de9355f75402699d6f1b6cbb4a98cbaacfe41_ppc64le", "product_id": "rhacm2/agent-service-rhel8@sha256:9e13b8a4610b11815be84028bf7de9355f75402699d6f1b6cbb4a98cbaacfe41_ppc64le", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:9e13b8a4610b11815be84028bf7de9355f75402699d6f1b6cbb4a98cbaacfe41?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:f501f4bc0a9e3acd86eca2c05d1b6dae90e03d060015a94c32ce31f903372d5c_ppc64le", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:f501f4bc0a9e3acd86eca2c05d1b6dae90e03d060015a94c32ce31f903372d5c_ppc64le", "product_id": "rhacm2/assisted-installer-rhel8@sha256:f501f4bc0a9e3acd86eca2c05d1b6dae90e03d060015a94c32ce31f903372d5c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:f501f4bc0a9e3acd86eca2c05d1b6dae90e03d060015a94c32ce31f903372d5c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:9675875122b5001393ef4e6a6ac7bafdee592c8c9bc91fcd0a71acd57e3750bb_ppc64le", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:9675875122b5001393ef4e6a6ac7bafdee592c8c9bc91fcd0a71acd57e3750bb_ppc64le", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:9675875122b5001393ef4e6a6ac7bafdee592c8c9bc91fcd0a71acd57e3750bb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:9675875122b5001393ef4e6a6ac7bafdee592c8c9bc91fcd0a71acd57e3750bb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:6bf94d358b66666064d768e9c3fdf498becb62bd9dd9f1c3f287f5940effd648_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:6bf94d358b66666064d768e9c3fdf498becb62bd9dd9f1c3f287f5940effd648_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:6bf94d358b66666064d768e9c3fdf498becb62bd9dd9f1c3f287f5940effd648_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:6bf94d358b66666064d768e9c3fdf498becb62bd9dd9f1c3f287f5940effd648?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:ff0b767f49ad6c5cadd8e41155b3906fa4a64554d5629809bbcefd4a5da52ad0_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:ff0b767f49ad6c5cadd8e41155b3906fa4a64554d5629809bbcefd4a5da52ad0_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:ff0b767f49ad6c5cadd8e41155b3906fa4a64554d5629809bbcefd4a5da52ad0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:ff0b767f49ad6c5cadd8e41155b3906fa4a64554d5629809bbcefd4a5da52ad0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:047c09e212d1c3d24b70c0e78c8c0cbd55c13a3b0f8bc74d0a11debffaf2bdaf_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:047c09e212d1c3d24b70c0e78c8c0cbd55c13a3b0f8bc74d0a11debffaf2bdaf_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:047c09e212d1c3d24b70c0e78c8c0cbd55c13a3b0f8bc74d0a11debffaf2bdaf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:047c09e212d1c3d24b70c0e78c8c0cbd55c13a3b0f8bc74d0a11debffaf2bdaf?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:3d823a648bd61b0c5b7e7f7ff7b7e6b3ebb3718885aff1b05425ac40cec9fa05_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:3d823a648bd61b0c5b7e7f7ff7b7e6b3ebb3718885aff1b05425ac40cec9fa05_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:3d823a648bd61b0c5b7e7f7ff7b7e6b3ebb3718885aff1b05425ac40cec9fa05_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:3d823a648bd61b0c5b7e7f7ff7b7e6b3ebb3718885aff1b05425ac40cec9fa05?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:c0b8e5d43945d0e251fcbb1ee26b9c4c0610de96ef345c4fdd1bc64fae6dd444_ppc64le", "product": { "name": "rhacm2/search-ui-rhel8@sha256:c0b8e5d43945d0e251fcbb1ee26b9c4c0610de96ef345c4fdd1bc64fae6dd444_ppc64le", "product_id": "rhacm2/search-ui-rhel8@sha256:c0b8e5d43945d0e251fcbb1ee26b9c4c0610de96ef345c4fdd1bc64fae6dd444_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:c0b8e5d43945d0e251fcbb1ee26b9c4c0610de96ef345c4fdd1bc64fae6dd444?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:8791a21c0396c374e2791a23716f643947bfd742fe56f5483336d29ee57750ca_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:8791a21c0396c374e2791a23716f643947bfd742fe56f5483336d29ee57750ca_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:8791a21c0396c374e2791a23716f643947bfd742fe56f5483336d29ee57750ca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:8791a21c0396c374e2791a23716f643947bfd742fe56f5483336d29ee57750ca?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel7@sha256:7e9c9a46abd9e00b2e77d06583ca2644c21ed64cc89baadc51e00934613fe1a2_ppc64le", "product": { "name": "rhacm2/thanos-rhel7@sha256:7e9c9a46abd9e00b2e77d06583ca2644c21ed64cc89baadc51e00934613fe1a2_ppc64le", "product_id": "rhacm2/thanos-rhel7@sha256:7e9c9a46abd9e00b2e77d06583ca2644c21ed64cc89baadc51e00934613fe1a2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel7@sha256:7e9c9a46abd9e00b2e77d06583ca2644c21ed64cc89baadc51e00934613fe1a2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel7\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:df4ad638a80c673121997ef8054893cc9d6968e706211df807c31da43aa6c0e6_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:df4ad638a80c673121997ef8054893cc9d6968e706211df807c31da43aa6c0e6_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:df4ad638a80c673121997ef8054893cc9d6968e706211df807c31da43aa6c0e6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:df4ad638a80c673121997ef8054893cc9d6968e706211df807c31da43aa6c0e6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:c72c6a08cc557ac85d2690e7e8996db98c70545c64348432780858a90c017610_ppc64le", "product": { "name": "rhacm2/work-rhel8@sha256:c72c6a08cc557ac85d2690e7e8996db98c70545c64348432780858a90c017610_ppc64le", "product_id": "rhacm2/work-rhel8@sha256:c72c6a08cc557ac85d2690e7e8996db98c70545c64348432780858a90c017610_ppc64le", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:c72c6a08cc557ac85d2690e7e8996db98c70545c64348432780858a90c017610?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.3.12-4" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:5462f1cb074c593dec22d2b32ac23039155598260f5d4ee332c66cfe8195f207_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:5462f1cb074c593dec22d2b32ac23039155598260f5d4ee332c66cfe8195f207_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:5462f1cb074c593dec22d2b32ac23039155598260f5d4ee332c66cfe8195f207_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:5462f1cb074c593dec22d2b32ac23039155598260f5d4ee332c66cfe8195f207?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:cafbda0901580bb72a2613d15ee658927da0f7bfa5ea1423332c5de95e698041_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:cafbda0901580bb72a2613d15ee658927da0f7bfa5ea1423332c5de95e698041_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:cafbda0901580bb72a2613d15ee658927da0f7bfa5ea1423332c5de95e698041_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:cafbda0901580bb72a2613d15ee658927da0f7bfa5ea1423332c5de95e698041?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:c66c1d55806626b477bb32bff202b6b75089e98099400975fc99b1e3db4e69b1_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:c66c1d55806626b477bb32bff202b6b75089e98099400975fc99b1e3db4e69b1_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:c66c1d55806626b477bb32bff202b6b75089e98099400975fc99b1e3db4e69b1_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:c66c1d55806626b477bb32bff202b6b75089e98099400975fc99b1e3db4e69b1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.3.12-12" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:cb8936e165acd1b9072da825c783a81ca6823da3b79391e386716904b8c982bc_amd64", "product": { "name": "rhacm2/application-ui-rhel8@sha256:cb8936e165acd1b9072da825c783a81ca6823da3b79391e386716904b8c982bc_amd64", "product_id": "rhacm2/application-ui-rhel8@sha256:cb8936e165acd1b9072da825c783a81ca6823da3b79391e386716904b8c982bc_amd64", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:cb8936e165acd1b9072da825c783a81ca6823da3b79391e386716904b8c982bc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:549deeeb6f619a12e2162f40aa17e67c9f3e3492970ca1bba4509d6176a9fb54_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:549deeeb6f619a12e2162f40aa17e67c9f3e3492970ca1bba4509d6176a9fb54_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:549deeeb6f619a12e2162f40aa17e67c9f3e3492970ca1bba4509d6176a9fb54_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:549deeeb6f619a12e2162f40aa17e67c9f3e3492970ca1bba4509d6176a9fb54?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:d6a147d1a02f4c702b25a3d5b92fed131e94f7d34227f33c6910e255a4c61127_amd64", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:d6a147d1a02f4c702b25a3d5b92fed131e94f7d34227f33c6910e255a4c61127_amd64", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:d6a147d1a02f4c702b25a3d5b92fed131e94f7d34227f33c6910e255a4c61127_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:d6a147d1a02f4c702b25a3d5b92fed131e94f7d34227f33c6910e255a4c61127?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:9c52a4d57bb174e8b4c2fb6793ac94b087e0cc6cb24ea1480052ce430369370e_amd64", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:9c52a4d57bb174e8b4c2fb6793ac94b087e0cc6cb24ea1480052ce430369370e_amd64", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:9c52a4d57bb174e8b4c2fb6793ac94b087e0cc6cb24ea1480052ce430369370e_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:9c52a4d57bb174e8b4c2fb6793ac94b087e0cc6cb24ea1480052ce430369370e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:7da556098e5e536a92792062f18798d8b4b4c5e43d961eaa545b4360d8a74492_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:7da556098e5e536a92792062f18798d8b4b4c5e43d961eaa545b4360d8a74492_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:7da556098e5e536a92792062f18798d8b4b4c5e43d961eaa545b4360d8a74492_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:7da556098e5e536a92792062f18798d8b4b4c5e43d961eaa545b4360d8a74492?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:534dd3df29b0a59a766a1e0ac6e0d04376d9dfbfbf4bece508f147b60a8bc9fd_amd64", "product": { "name": "rhacm2/console-api-rhel8@sha256:534dd3df29b0a59a766a1e0ac6e0d04376d9dfbfbf4bece508f147b60a8bc9fd_amd64", "product_id": "rhacm2/console-api-rhel8@sha256:534dd3df29b0a59a766a1e0ac6e0d04376d9dfbfbf4bece508f147b60a8bc9fd_amd64", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:534dd3df29b0a59a766a1e0ac6e0d04376d9dfbfbf4bece508f147b60a8bc9fd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:2f090e167fa9bace7e3dbac425921bcdbf415d454de99d868a14226862888945_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:2f090e167fa9bace7e3dbac425921bcdbf415d454de99d868a14226862888945_amd64", "product_id": "rhacm2/console-rhel8@sha256:2f090e167fa9bace7e3dbac425921bcdbf415d454de99d868a14226862888945_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:2f090e167fa9bace7e3dbac425921bcdbf415d454de99d868a14226862888945?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:a8683ec8eddb7509155b8935b19e4ec33a6fa5870ae0126e8d885e5dfbb2221a_amd64", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:a8683ec8eddb7509155b8935b19e4ec33a6fa5870ae0126e8d885e5dfbb2221a_amd64", "product_id": "rhacm2/discovery-rhel8-operator@sha256:a8683ec8eddb7509155b8935b19e4ec33a6fa5870ae0126e8d885e5dfbb2221a_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:a8683ec8eddb7509155b8935b19e4ec33a6fa5870ae0126e8d885e5dfbb2221a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:8a223c90fd554a36c8ec26c463ca895568364f550b2921f13e3498a4f0dee636_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:8a223c90fd554a36c8ec26c463ca895568364f550b2921f13e3498a4f0dee636_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:8a223c90fd554a36c8ec26c463ca895568364f550b2921f13e3498a4f0dee636_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:8a223c90fd554a36c8ec26c463ca895568364f550b2921f13e3498a4f0dee636?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:da1bb14e382749fb72f08c23366df733e5804229ce8265fa8029d18eb6ad10b9_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:da1bb14e382749fb72f08c23366df733e5804229ce8265fa8029d18eb6ad10b9_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:da1bb14e382749fb72f08c23366df733e5804229ce8265fa8029d18eb6ad10b9_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:da1bb14e382749fb72f08c23366df733e5804229ce8265fa8029d18eb6ad10b9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ca3e6dbf9e8859fa4ca2562feccc457989a761143e849dafcefad7128c046ac0_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ca3e6dbf9e8859fa4ca2562feccc457989a761143e849dafcefad7128c046ac0_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ca3e6dbf9e8859fa4ca2562feccc457989a761143e849dafcefad7128c046ac0_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:ca3e6dbf9e8859fa4ca2562feccc457989a761143e849dafcefad7128c046ac0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:694b1ec5af7c84d439a3a9a6ccf6f6c1325cdcd6d726107c2d533f8bb4e0a659_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:694b1ec5af7c84d439a3a9a6ccf6f6c1325cdcd6d726107c2d533f8bb4e0a659_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:694b1ec5af7c84d439a3a9a6ccf6f6c1325cdcd6d726107c2d533f8bb4e0a659_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:694b1ec5af7c84d439a3a9a6ccf6f6c1325cdcd6d726107c2d533f8bb4e0a659?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:1f969dd1a416c5a502642e0b6f26b23f6feb08ce882dc0c767332e3e6155fda0_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:1f969dd1a416c5a502642e0b6f26b23f6feb08ce882dc0c767332e3e6155fda0_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:1f969dd1a416c5a502642e0b6f26b23f6feb08ce882dc0c767332e3e6155fda0_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:1f969dd1a416c5a502642e0b6f26b23f6feb08ce882dc0c767332e3e6155fda0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:98a728704ae8914fa30865c432eabdf3bb0079ad36889f7ef267637d8b77ce58_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:98a728704ae8914fa30865c432eabdf3bb0079ad36889f7ef267637d8b77ce58_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:98a728704ae8914fa30865c432eabdf3bb0079ad36889f7ef267637d8b77ce58_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:98a728704ae8914fa30865c432eabdf3bb0079ad36889f7ef267637d8b77ce58?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:eb683ca36fbda111a78919ae7c116c1eb25b7381d4bd832677fe7ffa1e8a9ae9_amd64", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:eb683ca36fbda111a78919ae7c116c1eb25b7381d4bd832677fe7ffa1e8a9ae9_amd64", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:eb683ca36fbda111a78919ae7c116c1eb25b7381d4bd832677fe7ffa1e8a9ae9_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:eb683ca36fbda111a78919ae7c116c1eb25b7381d4bd832677fe7ffa1e8a9ae9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:7fff192d63fcec1c7269bd33a930af85b5e8970903b2c9adbafd27c846ede149_amd64", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:7fff192d63fcec1c7269bd33a930af85b5e8970903b2c9adbafd27c846ede149_amd64", "product_id": "rhacm2/grc-ui-rhel8@sha256:7fff192d63fcec1c7269bd33a930af85b5e8970903b2c9adbafd27c846ede149_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:7fff192d63fcec1c7269bd33a930af85b5e8970903b2c9adbafd27c846ede149?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:7420fe81f62c35e368a6475afb5cb3259122f20d863841432f79783ca3aa98b8_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:7420fe81f62c35e368a6475afb5cb3259122f20d863841432f79783ca3aa98b8_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:7420fe81f62c35e368a6475afb5cb3259122f20d863841432f79783ca3aa98b8_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:7420fe81f62c35e368a6475afb5cb3259122f20d863841432f79783ca3aa98b8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:6c25434471cae697b263c7bc1c0c897169770d3f0781bf22721ec9d1f53ef4bd_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:6c25434471cae697b263c7bc1c0c897169770d3f0781bf22721ec9d1f53ef4bd_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:6c25434471cae697b263c7bc1c0c897169770d3f0781bf22721ec9d1f53ef4bd_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:6c25434471cae697b263c7bc1c0c897169770d3f0781bf22721ec9d1f53ef4bd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:9e652db1d8f54105b06184fb6f6009339dd17330914efd6f236bea8182bbf1a6_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:9e652db1d8f54105b06184fb6f6009339dd17330914efd6f236bea8182bbf1a6_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:9e652db1d8f54105b06184fb6f6009339dd17330914efd6f236bea8182bbf1a6_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:9e652db1d8f54105b06184fb6f6009339dd17330914efd6f236bea8182bbf1a6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:b69cbdc8fb3b2a96b2a36eeebc81c1d835baf0dfdd915034f75acb2bd1cec265_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:b69cbdc8fb3b2a96b2a36eeebc81c1d835baf0dfdd915034f75acb2bd1cec265_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:b69cbdc8fb3b2a96b2a36eeebc81c1d835baf0dfdd915034f75acb2bd1cec265_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:b69cbdc8fb3b2a96b2a36eeebc81c1d835baf0dfdd915034f75acb2bd1cec265?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:31186b499dca641bd7f18ed9ba12393e0d7fe5adb0d8f7359ed14611493f0911_amd64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:31186b499dca641bd7f18ed9ba12393e0d7fe5adb0d8f7359ed14611493f0911_amd64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:31186b499dca641bd7f18ed9ba12393e0d7fe5adb0d8f7359ed14611493f0911_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:31186b499dca641bd7f18ed9ba12393e0d7fe5adb0d8f7359ed14611493f0911?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/kui-web-terminal-rhel8@sha256:8e1d64a7eea72bd0e5ff7b49acef73789caabc73fdf32a7a6a4ea890e01a1432_amd64", "product": { "name": "rhacm2/kui-web-terminal-rhel8@sha256:8e1d64a7eea72bd0e5ff7b49acef73789caabc73fdf32a7a6a4ea890e01a1432_amd64", "product_id": "rhacm2/kui-web-terminal-rhel8@sha256:8e1d64a7eea72bd0e5ff7b49acef73789caabc73fdf32a7a6a4ea890e01a1432_amd64", "product_identification_helper": { "purl": "pkg:oci/kui-web-terminal-rhel8@sha256:8e1d64a7eea72bd0e5ff7b49acef73789caabc73fdf32a7a6a4ea890e01a1432?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kui-web-terminal-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:07dac07aac995190fa215b35498f71370070a16dc483628c1acbeed8489772e7_amd64", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:07dac07aac995190fa215b35498f71370070a16dc483628c1acbeed8489772e7_amd64", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:07dac07aac995190fa215b35498f71370070a16dc483628c1acbeed8489772e7_amd64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:07dac07aac995190fa215b35498f71370070a16dc483628c1acbeed8489772e7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel7@sha256:f5fdd5f3b34c59d7d1eb73a26e056a24ff003825e528535d0acf3f4b205766a2_amd64", "product": { "name": "rhacm2/management-ingress-rhel7@sha256:f5fdd5f3b34c59d7d1eb73a26e056a24ff003825e528535d0acf3f4b205766a2_amd64", "product_id": "rhacm2/management-ingress-rhel7@sha256:f5fdd5f3b34c59d7d1eb73a26e056a24ff003825e528535d0acf3f4b205766a2_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel7@sha256:f5fdd5f3b34c59d7d1eb73a26e056a24ff003825e528535d0acf3f4b205766a2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel7\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:635a1bdca4856fe4274e990ffe1beac888c258f1d463b11e7a0ed8c9d715b467_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:635a1bdca4856fe4274e990ffe1beac888c258f1d463b11e7a0ed8c9d715b467_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:635a1bdca4856fe4274e990ffe1beac888c258f1d463b11e7a0ed8c9d715b467_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:635a1bdca4856fe4274e990ffe1beac888c258f1d463b11e7a0ed8c9d715b467?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel7@sha256:abe82a77c0b20434fd9e30bb4f50c4be43e407e6eee1f824ecf045a89f113757_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel7@sha256:abe82a77c0b20434fd9e30bb4f50c4be43e407e6eee1f824ecf045a89f113757_amd64", "product_id": "rhacm2/memcached-exporter-rhel7@sha256:abe82a77c0b20434fd9e30bb4f50c4be43e407e6eee1f824ecf045a89f113757_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel7@sha256:abe82a77c0b20434fd9e30bb4f50c4be43e407e6eee1f824ecf045a89f113757?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel7\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:7cf6fc798ecd6035a7274b1901b71159656c4ac2b8b03595023e57ab656970a4_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:7cf6fc798ecd6035a7274b1901b71159656c4ac2b8b03595023e57ab656970a4_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:7cf6fc798ecd6035a7274b1901b71159656c4ac2b8b03595023e57ab656970a4_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:7cf6fc798ecd6035a7274b1901b71159656c4ac2b8b03595023e57ab656970a4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:9cfaa207ccdfcfe2dacb250502f7a1bfe06c168a0f3d5c2f796922d86295d0bf_amd64", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:9cfaa207ccdfcfe2dacb250502f7a1bfe06c168a0f3d5c2f796922d86295d0bf_amd64", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:9cfaa207ccdfcfe2dacb250502f7a1bfe06c168a0f3d5c2f796922d86295d0bf_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:9cfaa207ccdfcfe2dacb250502f7a1bfe06c168a0f3d5c2f796922d86295d0bf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:63d9d2f2fd2f43d3b16f748a35c55617b4e150b79753ff7a2278060815a3d58c_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:63d9d2f2fd2f43d3b16f748a35c55617b4e150b79753ff7a2278060815a3d58c_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:63d9d2f2fd2f43d3b16f748a35c55617b4e150b79753ff7a2278060815a3d58c_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:63d9d2f2fd2f43d3b16f748a35c55617b4e150b79753ff7a2278060815a3d58c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:8b37ebb110341edb028da13358a0e25d21a59449b3f359ee3bf1c3f89af54a63_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:8b37ebb110341edb028da13358a0e25d21a59449b3f359ee3bf1c3f89af54a63_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:8b37ebb110341edb028da13358a0e25d21a59449b3f359ee3bf1c3f89af54a63_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:8b37ebb110341edb028da13358a0e25d21a59449b3f359ee3bf1c3f89af54a63?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:cc125c467c17953a31bfe5845598f3bbf730b0eb078d9e0e8ea627e32d116d1a_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:cc125c467c17953a31bfe5845598f3bbf730b0eb078d9e0e8ea627e32d116d1a_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:cc125c467c17953a31bfe5845598f3bbf730b0eb078d9e0e8ea627e32d116d1a_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:cc125c467c17953a31bfe5845598f3bbf730b0eb078d9e0e8ea627e32d116d1a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:671c02a0d9fb1966238afda0e64affe038f5c32e421ccaa40f0da329a3b6df2b_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:671c02a0d9fb1966238afda0e64affe038f5c32e421ccaa40f0da329a3b6df2b_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:671c02a0d9fb1966238afda0e64affe038f5c32e421ccaa40f0da329a3b6df2b_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:671c02a0d9fb1966238afda0e64affe038f5c32e421ccaa40f0da329a3b6df2b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:38d8e305fa53afae1c0699bafdddb33472525d9c79e687915ae685de42ef5cc4_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:38d8e305fa53afae1c0699bafdddb33472525d9c79e687915ae685de42ef5cc4_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:38d8e305fa53afae1c0699bafdddb33472525d9c79e687915ae685de42ef5cc4_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:38d8e305fa53afae1c0699bafdddb33472525d9c79e687915ae685de42ef5cc4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:49c70b19e22b140c837ebb6010d8d592dba1855a9cd07bbf33905110f8a962ce_amd64", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:49c70b19e22b140c837ebb6010d8d592dba1855a9cd07bbf33905110f8a962ce_amd64", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:49c70b19e22b140c837ebb6010d8d592dba1855a9cd07bbf33905110f8a962ce_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:49c70b19e22b140c837ebb6010d8d592dba1855a9cd07bbf33905110f8a962ce?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:649824f00f658b0614aab89b39332acee06ccdcc023149751f35e92adb5ab945_amd64", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:649824f00f658b0614aab89b39332acee06ccdcc023149751f35e92adb5ab945_amd64", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:649824f00f658b0614aab89b39332acee06ccdcc023149751f35e92adb5ab945_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:649824f00f658b0614aab89b39332acee06ccdcc023149751f35e92adb5ab945?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:aff03be35e3de24ab5af37f7f319801c9b7809ac93cabad3c67519c64189897e_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:aff03be35e3de24ab5af37f7f319801c9b7809ac93cabad3c67519c64189897e_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:aff03be35e3de24ab5af37f7f319801c9b7809ac93cabad3c67519c64189897e_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:aff03be35e3de24ab5af37f7f319801c9b7809ac93cabad3c67519c64189897e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:05192653c6d7f2830e4e146bfa0047488b4dd5d792f9e8b12a6ed10e6009d08c_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:05192653c6d7f2830e4e146bfa0047488b4dd5d792f9e8b12a6ed10e6009d08c_amd64", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:05192653c6d7f2830e4e146bfa0047488b4dd5d792f9e8b12a6ed10e6009d08c_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:05192653c6d7f2830e4e146bfa0047488b4dd5d792f9e8b12a6ed10e6009d08c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:e9854b1d4e1a1c10ae28f560752fc2c8ad239b4c5d0bd8562cb0a8852776b115_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:e9854b1d4e1a1c10ae28f560752fc2c8ad239b4c5d0bd8562cb0a8852776b115_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:e9854b1d4e1a1c10ae28f560752fc2c8ad239b4c5d0bd8562cb0a8852776b115_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:e9854b1d4e1a1c10ae28f560752fc2c8ad239b4c5d0bd8562cb0a8852776b115?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:e4b7d3134aa49a1c93535ab6237eb7efec01bec229499309797772dfa2650910_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:e4b7d3134aa49a1c93535ab6237eb7efec01bec229499309797772dfa2650910_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:e4b7d3134aa49a1c93535ab6237eb7efec01bec229499309797772dfa2650910_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:e4b7d3134aa49a1c93535ab6237eb7efec01bec229499309797772dfa2650910?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:8e8e1a3ddb874b1c8bc801f3da034798072a83c232fa90e3a6e328e382435fe8_amd64", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:8e8e1a3ddb874b1c8bc801f3da034798072a83c232fa90e3a6e328e382435fe8_amd64", "product_id": "rhacm2/openshift-hive-rhel8@sha256:8e8e1a3ddb874b1c8bc801f3da034798072a83c232fa90e3a6e328e382435fe8_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:8e8e1a3ddb874b1c8bc801f3da034798072a83c232fa90e3a6e328e382435fe8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:25339dd6aacf9778a75d794d0b12d1058bf6f9e3c7e7ccb998e04f75dec0c824_amd64", "product": { "name": "rhacm2/placement-rhel8@sha256:25339dd6aacf9778a75d794d0b12d1058bf6f9e3c7e7ccb998e04f75dec0c824_amd64", "product_id": "rhacm2/placement-rhel8@sha256:25339dd6aacf9778a75d794d0b12d1058bf6f9e3c7e7ccb998e04f75dec0c824_amd64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:25339dd6aacf9778a75d794d0b12d1058bf6f9e3c7e7ccb998e04f75dec0c824?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:5041aebd780a81c1089f63d41f5452dce405c1a48cbe9601d4987c2cd0f545db_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:5041aebd780a81c1089f63d41f5452dce405c1a48cbe9601d4987c2cd0f545db_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:5041aebd780a81c1089f63d41f5452dce405c1a48cbe9601d4987c2cd0f545db_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:5041aebd780a81c1089f63d41f5452dce405c1a48cbe9601d4987c2cd0f545db?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:dd253eac64c3f09ff5b5f445afe9c470e35d99e516affc350eedc9c8ff684ac5_amd64", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:dd253eac64c3f09ff5b5f445afe9c470e35d99e516affc350eedc9c8ff684ac5_amd64", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:dd253eac64c3f09ff5b5f445afe9c470e35d99e516affc350eedc9c8ff684ac5_amd64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:dd253eac64c3f09ff5b5f445afe9c470e35d99e516affc350eedc9c8ff684ac5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:81c96abd6e9d2226cad1a05d90c53b186421e95ce8a2fa19e7751ad60fac111f_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:81c96abd6e9d2226cad1a05d90c53b186421e95ce8a2fa19e7751ad60fac111f_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:81c96abd6e9d2226cad1a05d90c53b186421e95ce8a2fa19e7751ad60fac111f_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:81c96abd6e9d2226cad1a05d90c53b186421e95ce8a2fa19e7751ad60fac111f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:794c69bb58199712b9f685e422a97b8f4ba3867670431367f53f77d55d735b9d_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:794c69bb58199712b9f685e422a97b8f4ba3867670431367f53f77d55d735b9d_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:794c69bb58199712b9f685e422a97b8f4ba3867670431367f53f77d55d735b9d_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:794c69bb58199712b9f685e422a97b8f4ba3867670431367f53f77d55d735b9d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:90125ef36957dd46563547ba92288c1aeabaffca8da1412fbd0c040bd19907a2_amd64", "product": { "name": "rhacm2/registration-rhel8@sha256:90125ef36957dd46563547ba92288c1aeabaffca8da1412fbd0c040bd19907a2_amd64", "product_id": "rhacm2/registration-rhel8@sha256:90125ef36957dd46563547ba92288c1aeabaffca8da1412fbd0c040bd19907a2_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:90125ef36957dd46563547ba92288c1aeabaffca8da1412fbd0c040bd19907a2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:37255966c475174d79646e0e2f61c2c5728b925fb6f7931a24572687cc04dd7c_amd64", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:37255966c475174d79646e0e2f61c2c5728b925fb6f7931a24572687cc04dd7c_amd64", "product_id": "rhacm2/registration-rhel8-operator@sha256:37255966c475174d79646e0e2f61c2c5728b925fb6f7931a24572687cc04dd7c_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:37255966c475174d79646e0e2f61c2c5728b925fb6f7931a24572687cc04dd7c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:489d60ec5e6eda1b49c7a480e0f0e586a0b274d07df48d624e48b69b85f31e16_amd64", "product": { "name": "rhacm2/agent-service-rhel8@sha256:489d60ec5e6eda1b49c7a480e0f0e586a0b274d07df48d624e48b69b85f31e16_amd64", "product_id": "rhacm2/agent-service-rhel8@sha256:489d60ec5e6eda1b49c7a480e0f0e586a0b274d07df48d624e48b69b85f31e16_amd64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:489d60ec5e6eda1b49c7a480e0f0e586a0b274d07df48d624e48b69b85f31e16?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-agent-rhel8@sha256:7299da84e5dc26da48a7ee9780b01c1642ab7b930fa3722ee170c1a78d3a0afa_amd64", "product": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:7299da84e5dc26da48a7ee9780b01c1642ab7b930fa3722ee170c1a78d3a0afa_amd64", "product_id": "rhacm2/assisted-installer-agent-rhel8@sha256:7299da84e5dc26da48a7ee9780b01c1642ab7b930fa3722ee170c1a78d3a0afa_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:7299da84e5dc26da48a7ee9780b01c1642ab7b930fa3722ee170c1a78d3a0afa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-agent-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:dd4d3e2948ab564b21a5aaa5a0242feed99b70cfde44a7bddcfa4b2173609602_amd64", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:dd4d3e2948ab564b21a5aaa5a0242feed99b70cfde44a7bddcfa4b2173609602_amd64", "product_id": "rhacm2/assisted-installer-rhel8@sha256:dd4d3e2948ab564b21a5aaa5a0242feed99b70cfde44a7bddcfa4b2173609602_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:dd4d3e2948ab564b21a5aaa5a0242feed99b70cfde44a7bddcfa4b2173609602?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:2e96d4022f3f0270f197c75881ba8c168961652ccc60f58a014cddb9cfb2e497_amd64", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:2e96d4022f3f0270f197c75881ba8c168961652ccc60f58a014cddb9cfb2e497_amd64", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:2e96d4022f3f0270f197c75881ba8c168961652ccc60f58a014cddb9cfb2e497_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:2e96d4022f3f0270f197c75881ba8c168961652ccc60f58a014cddb9cfb2e497?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:cc15ad2f0a4274e6ce649ba96d5a8cfdda08ceb48c23ac764aa28f7a3e06d315_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:cc15ad2f0a4274e6ce649ba96d5a8cfdda08ceb48c23ac764aa28f7a3e06d315_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:cc15ad2f0a4274e6ce649ba96d5a8cfdda08ceb48c23ac764aa28f7a3e06d315_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:cc15ad2f0a4274e6ce649ba96d5a8cfdda08ceb48c23ac764aa28f7a3e06d315?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:e5de357f6b3074136b23491b9f4a7ae5445c5f9b376fe2231e49ac7aa6e2daec_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:e5de357f6b3074136b23491b9f4a7ae5445c5f9b376fe2231e49ac7aa6e2daec_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:e5de357f6b3074136b23491b9f4a7ae5445c5f9b376fe2231e49ac7aa6e2daec_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:e5de357f6b3074136b23491b9f4a7ae5445c5f9b376fe2231e49ac7aa6e2daec?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:804f7341a1b7159736025aa41041ee04a4cec0a494635a01ffb542845dbe27dc_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:804f7341a1b7159736025aa41041ee04a4cec0a494635a01ffb542845dbe27dc_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:804f7341a1b7159736025aa41041ee04a4cec0a494635a01ffb542845dbe27dc_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:804f7341a1b7159736025aa41041ee04a4cec0a494635a01ffb542845dbe27dc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:1c2adeaacb3eb9eed3fe20cc6c1f83e75498cc754645d26b84bff7c2204599aa_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:1c2adeaacb3eb9eed3fe20cc6c1f83e75498cc754645d26b84bff7c2204599aa_amd64", "product_id": "rhacm2/search-rhel8@sha256:1c2adeaacb3eb9eed3fe20cc6c1f83e75498cc754645d26b84bff7c2204599aa_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:1c2adeaacb3eb9eed3fe20cc6c1f83e75498cc754645d26b84bff7c2204599aa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:9773164120f0a5966df9e2a352a6d49a442f00992ed179ad6c14ab99e4c7bff0_amd64", "product": { "name": "rhacm2/search-ui-rhel8@sha256:9773164120f0a5966df9e2a352a6d49a442f00992ed179ad6c14ab99e4c7bff0_amd64", "product_id": "rhacm2/search-ui-rhel8@sha256:9773164120f0a5966df9e2a352a6d49a442f00992ed179ad6c14ab99e4c7bff0_amd64", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:9773164120f0a5966df9e2a352a6d49a442f00992ed179ad6c14ab99e4c7bff0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:b5a27b3f7bfb3f3ca65f7b7515de800516b9e73758f77a58dd86839254e3e2b8_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:b5a27b3f7bfb3f3ca65f7b7515de800516b9e73758f77a58dd86839254e3e2b8_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:b5a27b3f7bfb3f3ca65f7b7515de800516b9e73758f77a58dd86839254e3e2b8_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:b5a27b3f7bfb3f3ca65f7b7515de800516b9e73758f77a58dd86839254e3e2b8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel7@sha256:53ad20b1f040d85041657efc95a05f8477386fe1735d7c96e8ba07a05fa9b2be_amd64", "product": { "name": "rhacm2/thanos-rhel7@sha256:53ad20b1f040d85041657efc95a05f8477386fe1735d7c96e8ba07a05fa9b2be_amd64", "product_id": "rhacm2/thanos-rhel7@sha256:53ad20b1f040d85041657efc95a05f8477386fe1735d7c96e8ba07a05fa9b2be_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel7@sha256:53ad20b1f040d85041657efc95a05f8477386fe1735d7c96e8ba07a05fa9b2be?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel7\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:7a78d3a5e5323721ea89fe43e965a2b796c0b340ef5dfe7e4f1d1f8ddfe72a3a_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:7a78d3a5e5323721ea89fe43e965a2b796c0b340ef5dfe7e4f1d1f8ddfe72a3a_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:7a78d3a5e5323721ea89fe43e965a2b796c0b340ef5dfe7e4f1d1f8ddfe72a3a_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:7a78d3a5e5323721ea89fe43e965a2b796c0b340ef5dfe7e4f1d1f8ddfe72a3a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:76b83815e514e340417fb5eb1bb82c342734e18813d92ab86dbfe29ff65e084c_amd64", "product": { "name": "rhacm2/work-rhel8@sha256:76b83815e514e340417fb5eb1bb82c342734e18813d92ab86dbfe29ff65e084c_amd64", "product_id": "rhacm2/work-rhel8@sha256:76b83815e514e340417fb5eb1bb82c342734e18813d92ab86dbfe29ff65e084c_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:76b83815e514e340417fb5eb1bb82c342734e18813d92ab86dbfe29ff65e084c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.3.12-4" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:6b53a0c151a6fc5b066eb0c4afe057b653ff76227b9c223a3eafb74157454d2d_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:6b53a0c151a6fc5b066eb0c4afe057b653ff76227b9c223a3eafb74157454d2d_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:6b53a0c151a6fc5b066eb0c4afe057b653ff76227b9c223a3eafb74157454d2d_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:6b53a0c151a6fc5b066eb0c4afe057b653ff76227b9c223a3eafb74157454d2d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:a51a956bbac51ae096d32a373bfbcc520e8926be3608e05744b04ccf1e33f71e_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:a51a956bbac51ae096d32a373bfbcc520e8926be3608e05744b04ccf1e33f71e_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:a51a956bbac51ae096d32a373bfbcc520e8926be3608e05744b04ccf1e33f71e_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:a51a956bbac51ae096d32a373bfbcc520e8926be3608e05744b04ccf1e33f71e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c852e42dd5193ad1c7d056c9b635f29a791c4a16b43459a61196fc532f64a810_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c852e42dd5193ad1c7d056c9b635f29a791c4a16b43459a61196fc532f64a810_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c852e42dd5193ad1c7d056c9b635f29a791c4a16b43459a61196fc532f64a810_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:c852e42dd5193ad1c7d056c9b635f29a791c4a16b43459a61196fc532f64a810?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c96db8365c173bb434222da23b7ea536e6d48cbfc59b8ea5da7191d81116188_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c96db8365c173bb434222da23b7ea536e6d48cbfc59b8ea5da7191d81116188_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c96db8365c173bb434222da23b7ea536e6d48cbfc59b8ea5da7191d81116188_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:2c96db8365c173bb434222da23b7ea536e6d48cbfc59b8ea5da7191d81116188?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:9703e634221ffcc6bb43e7757eb88ace944941943e287a989572bc4ed2ac87dd_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:9703e634221ffcc6bb43e7757eb88ace944941943e287a989572bc4ed2ac87dd_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:9703e634221ffcc6bb43e7757eb88ace944941943e287a989572bc4ed2ac87dd_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:9703e634221ffcc6bb43e7757eb88ace944941943e287a989572bc4ed2ac87dd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:d7d044b26a46d497885f9cbe3da2b82793a822709f9b949a628553ecec9c6be9_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:d7d044b26a46d497885f9cbe3da2b82793a822709f9b949a628553ecec9c6be9_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:d7d044b26a46d497885f9cbe3da2b82793a822709f9b949a628553ecec9c6be9_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:d7d044b26a46d497885f9cbe3da2b82793a822709f9b949a628553ecec9c6be9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:33f309345b50f763a60d4214f8e81ebe247e5e08e5d47123e49027e045153ff4_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:33f309345b50f763a60d4214f8e81ebe247e5e08e5d47123e49027e045153ff4_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:33f309345b50f763a60d4214f8e81ebe247e5e08e5d47123e49027e045153ff4_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:33f309345b50f763a60d4214f8e81ebe247e5e08e5d47123e49027e045153ff4?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:ed671a0763bc5a91e570d0124536b26a0e64ca85c3328fc34b00695488789993_s390x", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:ed671a0763bc5a91e570d0124536b26a0e64ca85c3328fc34b00695488789993_s390x", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:ed671a0763bc5a91e570d0124536b26a0e64ca85c3328fc34b00695488789993_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:ed671a0763bc5a91e570d0124536b26a0e64ca85c3328fc34b00695488789993?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:2643d16445229c534adabfd0aff3f315369d6cd39f12eef432df0c323a6e9c93_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:2643d16445229c534adabfd0aff3f315369d6cd39f12eef432df0c323a6e9c93_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:2643d16445229c534adabfd0aff3f315369d6cd39f12eef432df0c323a6e9c93_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:2643d16445229c534adabfd0aff3f315369d6cd39f12eef432df0c323a6e9c93?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:fc0c2f42b1f5e161b1e8bf02317d5a955faad69626b99c3e2bd14bf25a037641_s390x", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:fc0c2f42b1f5e161b1e8bf02317d5a955faad69626b99c3e2bd14bf25a037641_s390x", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:fc0c2f42b1f5e161b1e8bf02317d5a955faad69626b99c3e2bd14bf25a037641_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:fc0c2f42b1f5e161b1e8bf02317d5a955faad69626b99c3e2bd14bf25a037641?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.3.12-5" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f318c2560a3493255c739b10ffdb2730d50a9c6d7c77323f82db1a678da7b4c9_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f318c2560a3493255c739b10ffdb2730d50a9c6d7c77323f82db1a678da7b4c9_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f318c2560a3493255c739b10ffdb2730d50a9c6d7c77323f82db1a678da7b4c9_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:f318c2560a3493255c739b10ffdb2730d50a9c6d7c77323f82db1a678da7b4c9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.3.12-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:b2b8859e33a00215f916243fccf98d7dcf1e3ed4c341d0b690a1bd919c9c6adc_s390x", "product": { "name": "rhacm2/registration-rhel8@sha256:b2b8859e33a00215f916243fccf98d7dcf1e3ed4c341d0b690a1bd919c9c6adc_s390x", "product_id": "rhacm2/registration-rhel8@sha256:b2b8859e33a00215f916243fccf98d7dcf1e3ed4c341d0b690a1bd919c9c6adc_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:b2b8859e33a00215f916243fccf98d7dcf1e3ed4c341d0b690a1bd919c9c6adc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:ec240366aea9063004433cd702d74cfc16020b478afe8f7070903005aba15461_s390x", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:ec240366aea9063004433cd702d74cfc16020b478afe8f7070903005aba15461_s390x", "product_id": "rhacm2/registration-rhel8-operator@sha256:ec240366aea9063004433cd702d74cfc16020b478afe8f7070903005aba15461_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:ec240366aea9063004433cd702d74cfc16020b478afe8f7070903005aba15461?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:9f49b4e0d3d6d993e8ff043fa396bc692ca0f50b5354f422ef45368a2207d9f2_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:9f49b4e0d3d6d993e8ff043fa396bc692ca0f50b5354f422ef45368a2207d9f2_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:9f49b4e0d3d6d993e8ff043fa396bc692ca0f50b5354f422ef45368a2207d9f2_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:9f49b4e0d3d6d993e8ff043fa396bc692ca0f50b5354f422ef45368a2207d9f2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.3.12-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:30db88c9eca70c76e985bec24b138d1f88b9c06d7f43f2280b94d491dc5b245c_s390x", "product": { "name": "rhacm2/work-rhel8@sha256:30db88c9eca70c76e985bec24b138d1f88b9c06d7f43f2280b94d491dc5b245c_s390x", "product_id": "rhacm2/work-rhel8@sha256:30db88c9eca70c76e985bec24b138d1f88b9c06d7f43f2280b94d491dc5b245c_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:30db88c9eca70c76e985bec24b138d1f88b9c06d7f43f2280b94d491dc5b245c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.3.12-4" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel7@sha256:b798d8f17236c6a809377d1dbc14e76686919986ed8ea4035629c7dcfeea9a14_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7", "product_id": "7Server-RHACM-2.3:rhacm2/management-ingress-rhel7@sha256:b798d8f17236c6a809377d1dbc14e76686919986ed8ea4035629c7dcfeea9a14_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel7@sha256:b798d8f17236c6a809377d1dbc14e76686919986ed8ea4035629c7dcfeea9a14_ppc64le", "relates_to_product_reference": "7Server-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel7@sha256:f5fdd5f3b34c59d7d1eb73a26e056a24ff003825e528535d0acf3f4b205766a2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7", "product_id": "7Server-RHACM-2.3:rhacm2/management-ingress-rhel7@sha256:f5fdd5f3b34c59d7d1eb73a26e056a24ff003825e528535d0acf3f4b205766a2_amd64" }, "product_reference": "rhacm2/management-ingress-rhel7@sha256:f5fdd5f3b34c59d7d1eb73a26e056a24ff003825e528535d0acf3f4b205766a2_amd64", "relates_to_product_reference": "7Server-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel7@sha256:88e14f3bd185d0158ead6bd41f1805320b55ed55a7ab7cb823418bbb075c1fe7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7", "product_id": "7Server-RHACM-2.3:rhacm2/memcached-exporter-rhel7@sha256:88e14f3bd185d0158ead6bd41f1805320b55ed55a7ab7cb823418bbb075c1fe7_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel7@sha256:88e14f3bd185d0158ead6bd41f1805320b55ed55a7ab7cb823418bbb075c1fe7_ppc64le", "relates_to_product_reference": "7Server-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel7@sha256:abe82a77c0b20434fd9e30bb4f50c4be43e407e6eee1f824ecf045a89f113757_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7", "product_id": "7Server-RHACM-2.3:rhacm2/memcached-exporter-rhel7@sha256:abe82a77c0b20434fd9e30bb4f50c4be43e407e6eee1f824ecf045a89f113757_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel7@sha256:abe82a77c0b20434fd9e30bb4f50c4be43e407e6eee1f824ecf045a89f113757_amd64", "relates_to_product_reference": "7Server-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel7@sha256:53ad20b1f040d85041657efc95a05f8477386fe1735d7c96e8ba07a05fa9b2be_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7", "product_id": "7Server-RHACM-2.3:rhacm2/thanos-rhel7@sha256:53ad20b1f040d85041657efc95a05f8477386fe1735d7c96e8ba07a05fa9b2be_amd64" }, "product_reference": "rhacm2/thanos-rhel7@sha256:53ad20b1f040d85041657efc95a05f8477386fe1735d7c96e8ba07a05fa9b2be_amd64", "relates_to_product_reference": "7Server-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel7@sha256:7e9c9a46abd9e00b2e77d06583ca2644c21ed64cc89baadc51e00934613fe1a2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7", "product_id": "7Server-RHACM-2.3:rhacm2/thanos-rhel7@sha256:7e9c9a46abd9e00b2e77d06583ca2644c21ed64cc89baadc51e00934613fe1a2_ppc64le" }, "product_reference": "rhacm2/thanos-rhel7@sha256:7e9c9a46abd9e00b2e77d06583ca2644c21ed64cc89baadc51e00934613fe1a2_ppc64le", "relates_to_product_reference": "7Server-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:5462f1cb074c593dec22d2b32ac23039155598260f5d4ee332c66cfe8195f207_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/acm-grafana-rhel8@sha256:5462f1cb074c593dec22d2b32ac23039155598260f5d4ee332c66cfe8195f207_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:5462f1cb074c593dec22d2b32ac23039155598260f5d4ee332c66cfe8195f207_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:9725c9180f597eb6615404f672ffeecd04f639cfd3c6097d91bb6ff636efb0d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/acm-grafana-rhel8@sha256:9725c9180f597eb6615404f672ffeecd04f639cfd3c6097d91bb6ff636efb0d2_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:9725c9180f597eb6615404f672ffeecd04f639cfd3c6097d91bb6ff636efb0d2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:800f487f71b2d65361af1b86bdd054643718321098cbecf0789717105394a6af_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/acm-must-gather-rhel8@sha256:800f487f71b2d65361af1b86bdd054643718321098cbecf0789717105394a6af_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:800f487f71b2d65361af1b86bdd054643718321098cbecf0789717105394a6af_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:cafbda0901580bb72a2613d15ee658927da0f7bfa5ea1423332c5de95e698041_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/acm-must-gather-rhel8@sha256:cafbda0901580bb72a2613d15ee658927da0f7bfa5ea1423332c5de95e698041_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:cafbda0901580bb72a2613d15ee658927da0f7bfa5ea1423332c5de95e698041_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:a45e23fdcfa02c1841152e352f58aea50c359ff442d3d3896e9ae0280996ba99_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/acm-operator-bundle@sha256:a45e23fdcfa02c1841152e352f58aea50c359ff442d3d3896e9ae0280996ba99_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:a45e23fdcfa02c1841152e352f58aea50c359ff442d3d3896e9ae0280996ba99_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:c66c1d55806626b477bb32bff202b6b75089e98099400975fc99b1e3db4e69b1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/acm-operator-bundle@sha256:c66c1d55806626b477bb32bff202b6b75089e98099400975fc99b1e3db4e69b1_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:c66c1d55806626b477bb32bff202b6b75089e98099400975fc99b1e3db4e69b1_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:489d60ec5e6eda1b49c7a480e0f0e586a0b274d07df48d624e48b69b85f31e16_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/agent-service-rhel8@sha256:489d60ec5e6eda1b49c7a480e0f0e586a0b274d07df48d624e48b69b85f31e16_amd64" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:489d60ec5e6eda1b49c7a480e0f0e586a0b274d07df48d624e48b69b85f31e16_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:9e13b8a4610b11815be84028bf7de9355f75402699d6f1b6cbb4a98cbaacfe41_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/agent-service-rhel8@sha256:9e13b8a4610b11815be84028bf7de9355f75402699d6f1b6cbb4a98cbaacfe41_ppc64le" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:9e13b8a4610b11815be84028bf7de9355f75402699d6f1b6cbb4a98cbaacfe41_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:3224179c171ba87c58ad417a94443fcea0b0619aa8f4b970825cad44e534a347_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/application-ui-rhel8@sha256:3224179c171ba87c58ad417a94443fcea0b0619aa8f4b970825cad44e534a347_ppc64le" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:3224179c171ba87c58ad417a94443fcea0b0619aa8f4b970825cad44e534a347_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:cb8936e165acd1b9072da825c783a81ca6823da3b79391e386716904b8c982bc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/application-ui-rhel8@sha256:cb8936e165acd1b9072da825c783a81ca6823da3b79391e386716904b8c982bc_amd64" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:cb8936e165acd1b9072da825c783a81ca6823da3b79391e386716904b8c982bc_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:7299da84e5dc26da48a7ee9780b01c1642ab7b930fa3722ee170c1a78d3a0afa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/assisted-installer-agent-rhel8@sha256:7299da84e5dc26da48a7ee9780b01c1642ab7b930fa3722ee170c1a78d3a0afa_amd64" }, "product_reference": "rhacm2/assisted-installer-agent-rhel8@sha256:7299da84e5dc26da48a7ee9780b01c1642ab7b930fa3722ee170c1a78d3a0afa_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:2e96d4022f3f0270f197c75881ba8c168961652ccc60f58a014cddb9cfb2e497_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/assisted-installer-reporter-rhel8@sha256:2e96d4022f3f0270f197c75881ba8c168961652ccc60f58a014cddb9cfb2e497_amd64" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:2e96d4022f3f0270f197c75881ba8c168961652ccc60f58a014cddb9cfb2e497_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:9675875122b5001393ef4e6a6ac7bafdee592c8c9bc91fcd0a71acd57e3750bb_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/assisted-installer-reporter-rhel8@sha256:9675875122b5001393ef4e6a6ac7bafdee592c8c9bc91fcd0a71acd57e3750bb_ppc64le" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:9675875122b5001393ef4e6a6ac7bafdee592c8c9bc91fcd0a71acd57e3750bb_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:dd4d3e2948ab564b21a5aaa5a0242feed99b70cfde44a7bddcfa4b2173609602_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/assisted-installer-rhel8@sha256:dd4d3e2948ab564b21a5aaa5a0242feed99b70cfde44a7bddcfa4b2173609602_amd64" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:dd4d3e2948ab564b21a5aaa5a0242feed99b70cfde44a7bddcfa4b2173609602_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:f501f4bc0a9e3acd86eca2c05d1b6dae90e03d060015a94c32ce31f903372d5c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/assisted-installer-rhel8@sha256:f501f4bc0a9e3acd86eca2c05d1b6dae90e03d060015a94c32ce31f903372d5c_ppc64le" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:f501f4bc0a9e3acd86eca2c05d1b6dae90e03d060015a94c32ce31f903372d5c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:549deeeb6f619a12e2162f40aa17e67c9f3e3492970ca1bba4509d6176a9fb54_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:549deeeb6f619a12e2162f40aa17e67c9f3e3492970ca1bba4509d6176a9fb54_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:549deeeb6f619a12e2162f40aa17e67c9f3e3492970ca1bba4509d6176a9fb54_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:6b53a0c151a6fc5b066eb0c4afe057b653ff76227b9c223a3eafb74157454d2d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:6b53a0c151a6fc5b066eb0c4afe057b653ff76227b9c223a3eafb74157454d2d_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:6b53a0c151a6fc5b066eb0c4afe057b653ff76227b9c223a3eafb74157454d2d_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:6d1fe4fad43f7f1321f87ed456716f41bb1b24eb00fd66f9758152b566b168c6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:6d1fe4fad43f7f1321f87ed456716f41bb1b24eb00fd66f9758152b566b168c6_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:6d1fe4fad43f7f1321f87ed456716f41bb1b24eb00fd66f9758152b566b168c6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:bb88a0bf65a8b938bd0ebdbebdae79be60f0ecc4f4a69025e2ffee17154dda6e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/cluster-curator-controller-rhel8@sha256:bb88a0bf65a8b938bd0ebdbebdae79be60f0ecc4f4a69025e2ffee17154dda6e_ppc64le" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:bb88a0bf65a8b938bd0ebdbebdae79be60f0ecc4f4a69025e2ffee17154dda6e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:d6a147d1a02f4c702b25a3d5b92fed131e94f7d34227f33c6910e255a4c61127_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/cluster-curator-controller-rhel8@sha256:d6a147d1a02f4c702b25a3d5b92fed131e94f7d34227f33c6910e255a4c61127_amd64" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:d6a147d1a02f4c702b25a3d5b92fed131e94f7d34227f33c6910e255a4c61127_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e3057346b858ce63922b46f8bcbca952cf83e66db24ab1f137a8fb1378795a8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e3057346b858ce63922b46f8bcbca952cf83e66db24ab1f137a8fb1378795a8_ppc64le" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e3057346b858ce63922b46f8bcbca952cf83e66db24ab1f137a8fb1378795a8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:9c52a4d57bb174e8b4c2fb6793ac94b087e0cc6cb24ea1480052ce430369370e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:9c52a4d57bb174e8b4c2fb6793ac94b087e0cc6cb24ea1480052ce430369370e_amd64" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:9c52a4d57bb174e8b4c2fb6793ac94b087e0cc6cb24ea1480052ce430369370e_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:7da556098e5e536a92792062f18798d8b4b4c5e43d961eaa545b4360d8a74492_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:7da556098e5e536a92792062f18798d8b4b4c5e43d961eaa545b4360d8a74492_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:7da556098e5e536a92792062f18798d8b4b4c5e43d961eaa545b4360d8a74492_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:a51a956bbac51ae096d32a373bfbcc520e8926be3608e05744b04ccf1e33f71e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:a51a956bbac51ae096d32a373bfbcc520e8926be3608e05744b04ccf1e33f71e_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:a51a956bbac51ae096d32a373bfbcc520e8926be3608e05744b04ccf1e33f71e_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:c5772c181334a58c44dff660be5feede0b08f6bfce5e5ab9bc59117db40e10ef_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:c5772c181334a58c44dff660be5feede0b08f6bfce5e5ab9bc59117db40e10ef_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:c5772c181334a58c44dff660be5feede0b08f6bfce5e5ab9bc59117db40e10ef_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:03099e106fe591e230f5ff47a90ce9e475575b4cd32f16fdd230e70c65128e77_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/console-api-rhel8@sha256:03099e106fe591e230f5ff47a90ce9e475575b4cd32f16fdd230e70c65128e77_ppc64le" }, "product_reference": "rhacm2/console-api-rhel8@sha256:03099e106fe591e230f5ff47a90ce9e475575b4cd32f16fdd230e70c65128e77_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:534dd3df29b0a59a766a1e0ac6e0d04376d9dfbfbf4bece508f147b60a8bc9fd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/console-api-rhel8@sha256:534dd3df29b0a59a766a1e0ac6e0d04376d9dfbfbf4bece508f147b60a8bc9fd_amd64" }, "product_reference": "rhacm2/console-api-rhel8@sha256:534dd3df29b0a59a766a1e0ac6e0d04376d9dfbfbf4bece508f147b60a8bc9fd_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:2f090e167fa9bace7e3dbac425921bcdbf415d454de99d868a14226862888945_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/console-rhel8@sha256:2f090e167fa9bace7e3dbac425921bcdbf415d454de99d868a14226862888945_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:2f090e167fa9bace7e3dbac425921bcdbf415d454de99d868a14226862888945_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:e93a19a6c0db798b328d7d921870dc597a90f3b829ce481b6cae952289da19b0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/console-rhel8@sha256:e93a19a6c0db798b328d7d921870dc597a90f3b829ce481b6cae952289da19b0_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:e93a19a6c0db798b328d7d921870dc597a90f3b829ce481b6cae952289da19b0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:219c952dcb29b569ccb1d318a73cd08d0c5f55e20000b4a852f5454b18dd8aa5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/discovery-rhel8-operator@sha256:219c952dcb29b569ccb1d318a73cd08d0c5f55e20000b4a852f5454b18dd8aa5_ppc64le" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:219c952dcb29b569ccb1d318a73cd08d0c5f55e20000b4a852f5454b18dd8aa5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:a8683ec8eddb7509155b8935b19e4ec33a6fa5870ae0126e8d885e5dfbb2221a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/discovery-rhel8-operator@sha256:a8683ec8eddb7509155b8935b19e4ec33a6fa5870ae0126e8d885e5dfbb2221a_amd64" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:a8683ec8eddb7509155b8935b19e4ec33a6fa5870ae0126e8d885e5dfbb2221a_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:3e6b3b09fe10fff48cd4de7e4de95d68c460e51019f25f4523339e0eda028eec_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:3e6b3b09fe10fff48cd4de7e4de95d68c460e51019f25f4523339e0eda028eec_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:3e6b3b09fe10fff48cd4de7e4de95d68c460e51019f25f4523339e0eda028eec_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:8a223c90fd554a36c8ec26c463ca895568364f550b2921f13e3498a4f0dee636_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:8a223c90fd554a36c8ec26c463ca895568364f550b2921f13e3498a4f0dee636_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:8a223c90fd554a36c8ec26c463ca895568364f550b2921f13e3498a4f0dee636_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c852e42dd5193ad1c7d056c9b635f29a791c4a16b43459a61196fc532f64a810_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c852e42dd5193ad1c7d056c9b635f29a791c4a16b43459a61196fc532f64a810_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c852e42dd5193ad1c7d056c9b635f29a791c4a16b43459a61196fc532f64a810_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:da1bb14e382749fb72f08c23366df733e5804229ce8265fa8029d18eb6ad10b9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-propagator-rhel8@sha256:da1bb14e382749fb72f08c23366df733e5804229ce8265fa8029d18eb6ad10b9_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:da1bb14e382749fb72f08c23366df733e5804229ce8265fa8029d18eb6ad10b9_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:f4f6a958f47633afc47cb92349e9fdf653b052a4f84106f3f06ff590071e47f5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-propagator-rhel8@sha256:f4f6a958f47633afc47cb92349e9fdf653b052a4f84106f3f06ff590071e47f5_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:f4f6a958f47633afc47cb92349e9fdf653b052a4f84106f3f06ff590071e47f5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c96db8365c173bb434222da23b7ea536e6d48cbfc59b8ea5da7191d81116188_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c96db8365c173bb434222da23b7ea536e6d48cbfc59b8ea5da7191d81116188_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2c96db8365c173bb434222da23b7ea536e6d48cbfc59b8ea5da7191d81116188_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:987f8b16c73bbdb4633118aaf88df560bced0f98e958a6b0359789adecc17274_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:987f8b16c73bbdb4633118aaf88df560bced0f98e958a6b0359789adecc17274_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:987f8b16c73bbdb4633118aaf88df560bced0f98e958a6b0359789adecc17274_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ca3e6dbf9e8859fa4ca2562feccc457989a761143e849dafcefad7128c046ac0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:ca3e6dbf9e8859fa4ca2562feccc457989a761143e849dafcefad7128c046ac0_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ca3e6dbf9e8859fa4ca2562feccc457989a761143e849dafcefad7128c046ac0_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:694b1ec5af7c84d439a3a9a6ccf6f6c1325cdcd6d726107c2d533f8bb4e0a659_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:694b1ec5af7c84d439a3a9a6ccf6f6c1325cdcd6d726107c2d533f8bb4e0a659_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:694b1ec5af7c84d439a3a9a6ccf6f6c1325cdcd6d726107c2d533f8bb4e0a659_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:9703e634221ffcc6bb43e7757eb88ace944941943e287a989572bc4ed2ac87dd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:9703e634221ffcc6bb43e7757eb88ace944941943e287a989572bc4ed2ac87dd_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:9703e634221ffcc6bb43e7757eb88ace944941943e287a989572bc4ed2ac87dd_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:c4a5f9877fe1aadac666ee57737dc9c06d3281c8296f41ece7d4cbbca35b5760_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:c4a5f9877fe1aadac666ee57737dc9c06d3281c8296f41ece7d4cbbca35b5760_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:c4a5f9877fe1aadac666ee57737dc9c06d3281c8296f41ece7d4cbbca35b5760_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:1f969dd1a416c5a502642e0b6f26b23f6feb08ce882dc0c767332e3e6155fda0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:1f969dd1a416c5a502642e0b6f26b23f6feb08ce882dc0c767332e3e6155fda0_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:1f969dd1a416c5a502642e0b6f26b23f6feb08ce882dc0c767332e3e6155fda0_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:d7d044b26a46d497885f9cbe3da2b82793a822709f9b949a628553ecec9c6be9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:d7d044b26a46d497885f9cbe3da2b82793a822709f9b949a628553ecec9c6be9_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:d7d044b26a46d497885f9cbe3da2b82793a822709f9b949a628553ecec9c6be9_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:e68013d7277592ed091338ba470c84290b7e5f6fe5f72611d5368ec6759fb9ba_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:e68013d7277592ed091338ba470c84290b7e5f6fe5f72611d5368ec6759fb9ba_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:e68013d7277592ed091338ba470c84290b7e5f6fe5f72611d5368ec6759fb9ba_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:719492a71598de1c02b90ece7e0205d29e51e4d1422b578f1ab1de6df2c51f31_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/grafana-dashboard-loader-rhel8@sha256:719492a71598de1c02b90ece7e0205d29e51e4d1422b578f1ab1de6df2c51f31_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:719492a71598de1c02b90ece7e0205d29e51e4d1422b578f1ab1de6df2c51f31_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:98a728704ae8914fa30865c432eabdf3bb0079ad36889f7ef267637d8b77ce58_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/grafana-dashboard-loader-rhel8@sha256:98a728704ae8914fa30865c432eabdf3bb0079ad36889f7ef267637d8b77ce58_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:98a728704ae8914fa30865c432eabdf3bb0079ad36889f7ef267637d8b77ce58_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:b7c7b8188a428be1e3fdcf999a5383ff01ce5f62952b4bce115160109bd535b7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/grc-ui-api-rhel8@sha256:b7c7b8188a428be1e3fdcf999a5383ff01ce5f62952b4bce115160109bd535b7_ppc64le" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:b7c7b8188a428be1e3fdcf999a5383ff01ce5f62952b4bce115160109bd535b7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:eb683ca36fbda111a78919ae7c116c1eb25b7381d4bd832677fe7ffa1e8a9ae9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/grc-ui-api-rhel8@sha256:eb683ca36fbda111a78919ae7c116c1eb25b7381d4bd832677fe7ffa1e8a9ae9_amd64" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:eb683ca36fbda111a78919ae7c116c1eb25b7381d4bd832677fe7ffa1e8a9ae9_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:7fff192d63fcec1c7269bd33a930af85b5e8970903b2c9adbafd27c846ede149_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/grc-ui-rhel8@sha256:7fff192d63fcec1c7269bd33a930af85b5e8970903b2c9adbafd27c846ede149_amd64" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:7fff192d63fcec1c7269bd33a930af85b5e8970903b2c9adbafd27c846ede149_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:c8ab69260af4bb6de5704478f642309c8aa9e2acd54c5b1523403e4ac2e6e3ba_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/grc-ui-rhel8@sha256:c8ab69260af4bb6de5704478f642309c8aa9e2acd54c5b1523403e4ac2e6e3ba_ppc64le" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:c8ab69260af4bb6de5704478f642309c8aa9e2acd54c5b1523403e4ac2e6e3ba_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:33f309345b50f763a60d4214f8e81ebe247e5e08e5d47123e49027e045153ff4_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:33f309345b50f763a60d4214f8e81ebe247e5e08e5d47123e49027e045153ff4_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:33f309345b50f763a60d4214f8e81ebe247e5e08e5d47123e49027e045153ff4_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:7420fe81f62c35e368a6475afb5cb3259122f20d863841432f79783ca3aa98b8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:7420fe81f62c35e368a6475afb5cb3259122f20d863841432f79783ca3aa98b8_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:7420fe81f62c35e368a6475afb5cb3259122f20d863841432f79783ca3aa98b8_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:d837fb83dfca6fcb7313810861539ca5885e3a0f47e924f7dbb979cea63c40be_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:d837fb83dfca6fcb7313810861539ca5885e3a0f47e924f7dbb979cea63c40be_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:d837fb83dfca6fcb7313810861539ca5885e3a0f47e924f7dbb979cea63c40be_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:6a98f068ff319a152ed9f9219b8d10f1fb2ba51dbf7df816a39ddf1b848544f9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/insights-client-rhel8@sha256:6a98f068ff319a152ed9f9219b8d10f1fb2ba51dbf7df816a39ddf1b848544f9_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:6a98f068ff319a152ed9f9219b8d10f1fb2ba51dbf7df816a39ddf1b848544f9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:6c25434471cae697b263c7bc1c0c897169770d3f0781bf22721ec9d1f53ef4bd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/insights-client-rhel8@sha256:6c25434471cae697b263c7bc1c0c897169770d3f0781bf22721ec9d1f53ef4bd_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:6c25434471cae697b263c7bc1c0c897169770d3f0781bf22721ec9d1f53ef4bd_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:9e652db1d8f54105b06184fb6f6009339dd17330914efd6f236bea8182bbf1a6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/insights-metrics-rhel8@sha256:9e652db1d8f54105b06184fb6f6009339dd17330914efd6f236bea8182bbf1a6_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:9e652db1d8f54105b06184fb6f6009339dd17330914efd6f236bea8182bbf1a6_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:d14c9d35c3cf30a852d3a797527af5a8934ba244be03672f21cd50279fe5224c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/insights-metrics-rhel8@sha256:d14c9d35c3cf30a852d3a797527af5a8934ba244be03672f21cd50279fe5224c_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:d14c9d35c3cf30a852d3a797527af5a8934ba244be03672f21cd50279fe5224c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:b69cbdc8fb3b2a96b2a36eeebc81c1d835baf0dfdd915034f75acb2bd1cec265_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/klusterlet-addon-controller-rhel8@sha256:b69cbdc8fb3b2a96b2a36eeebc81c1d835baf0dfdd915034f75acb2bd1cec265_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:b69cbdc8fb3b2a96b2a36eeebc81c1d835baf0dfdd915034f75acb2bd1cec265_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:c5660dcdf2383e3eab04388f7ef304390da4d6c936cd205d1bd6d9106b64750e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/klusterlet-addon-controller-rhel8@sha256:c5660dcdf2383e3eab04388f7ef304390da4d6c936cd205d1bd6d9106b64750e_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:c5660dcdf2383e3eab04388f7ef304390da4d6c936cd205d1bd6d9106b64750e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:31186b499dca641bd7f18ed9ba12393e0d7fe5adb0d8f7359ed14611493f0911_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:31186b499dca641bd7f18ed9ba12393e0d7fe5adb0d8f7359ed14611493f0911_amd64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:31186b499dca641bd7f18ed9ba12393e0d7fe5adb0d8f7359ed14611493f0911_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:3b941671138970358867ef95af1c9060e0b14b9918304ed228f1af0c64e32b7f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b941671138970358867ef95af1c9060e0b14b9918304ed228f1af0c64e32b7f_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:3b941671138970358867ef95af1c9060e0b14b9918304ed228f1af0c64e32b7f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:ed671a0763bc5a91e570d0124536b26a0e64ca85c3328fc34b00695488789993_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:ed671a0763bc5a91e570d0124536b26a0e64ca85c3328fc34b00695488789993_s390x" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:ed671a0763bc5a91e570d0124536b26a0e64ca85c3328fc34b00695488789993_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kui-web-terminal-rhel8@sha256:8e1d64a7eea72bd0e5ff7b49acef73789caabc73fdf32a7a6a4ea890e01a1432_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/kui-web-terminal-rhel8@sha256:8e1d64a7eea72bd0e5ff7b49acef73789caabc73fdf32a7a6a4ea890e01a1432_amd64" }, "product_reference": "rhacm2/kui-web-terminal-rhel8@sha256:8e1d64a7eea72bd0e5ff7b49acef73789caabc73fdf32a7a6a4ea890e01a1432_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kui-web-terminal-rhel8@sha256:f0e10c0fd8fd63d63e4bd77737570dddd8411b222c48a768233d3efcd68db540_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/kui-web-terminal-rhel8@sha256:f0e10c0fd8fd63d63e4bd77737570dddd8411b222c48a768233d3efcd68db540_ppc64le" }, "product_reference": "rhacm2/kui-web-terminal-rhel8@sha256:f0e10c0fd8fd63d63e4bd77737570dddd8411b222c48a768233d3efcd68db540_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:07dac07aac995190fa215b35498f71370070a16dc483628c1acbeed8489772e7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/managedcluster-import-controller-rhel8@sha256:07dac07aac995190fa215b35498f71370070a16dc483628c1acbeed8489772e7_amd64" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:07dac07aac995190fa215b35498f71370070a16dc483628c1acbeed8489772e7_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:21637cf2186a93bdbab90daeb0454bf8a100822ec349bed411636d914c702248_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/managedcluster-import-controller-rhel8@sha256:21637cf2186a93bdbab90daeb0454bf8a100822ec349bed411636d914c702248_ppc64le" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:21637cf2186a93bdbab90daeb0454bf8a100822ec349bed411636d914c702248_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:34a257ffa28c71140baf1582dff07e021cd332e63c0787dfa3e807f1abbc9cbc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/memcached-rhel8@sha256:34a257ffa28c71140baf1582dff07e021cd332e63c0787dfa3e807f1abbc9cbc_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:34a257ffa28c71140baf1582dff07e021cd332e63c0787dfa3e807f1abbc9cbc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:635a1bdca4856fe4274e990ffe1beac888c258f1d463b11e7a0ed8c9d715b467_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/memcached-rhel8@sha256:635a1bdca4856fe4274e990ffe1beac888c258f1d463b11e7a0ed8c9d715b467_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:635a1bdca4856fe4274e990ffe1beac888c258f1d463b11e7a0ed8c9d715b467_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:2643d16445229c534adabfd0aff3f315369d6cd39f12eef432df0c323a6e9c93_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:2643d16445229c534adabfd0aff3f315369d6cd39f12eef432df0c323a6e9c93_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:2643d16445229c534adabfd0aff3f315369d6cd39f12eef432df0c323a6e9c93_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:6349b661ed0a32f147234448493bf9e8b9193b8e286aca85ea419893992d72ae_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:6349b661ed0a32f147234448493bf9e8b9193b8e286aca85ea419893992d72ae_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:6349b661ed0a32f147234448493bf9e8b9193b8e286aca85ea419893992d72ae_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:7cf6fc798ecd6035a7274b1901b71159656c4ac2b8b03595023e57ab656970a4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:7cf6fc798ecd6035a7274b1901b71159656c4ac2b8b03595023e57ab656970a4_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:7cf6fc798ecd6035a7274b1901b71159656c4ac2b8b03595023e57ab656970a4_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:9cfaa207ccdfcfe2dacb250502f7a1bfe06c168a0f3d5c2f796922d86295d0bf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:9cfaa207ccdfcfe2dacb250502f7a1bfe06c168a0f3d5c2f796922d86295d0bf_amd64" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:9cfaa207ccdfcfe2dacb250502f7a1bfe06c168a0f3d5c2f796922d86295d0bf_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c9a5defd921604b3afd2ebcb81ac565812b2bf49f69365f8b0d5debad355bdae_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:c9a5defd921604b3afd2ebcb81ac565812b2bf49f69365f8b0d5debad355bdae_ppc64le" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:c9a5defd921604b3afd2ebcb81ac565812b2bf49f69365f8b0d5debad355bdae_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:fc0c2f42b1f5e161b1e8bf02317d5a955faad69626b99c3e2bd14bf25a037641_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:fc0c2f42b1f5e161b1e8bf02317d5a955faad69626b99c3e2bd14bf25a037641_s390x" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:fc0c2f42b1f5e161b1e8bf02317d5a955faad69626b99c3e2bd14bf25a037641_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:5ba5a496e3d16db90aede1e74cc168fb2f13f665059e0d626a99f8370cfd70de_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-observability-rhel8-operator@sha256:5ba5a496e3d16db90aede1e74cc168fb2f13f665059e0d626a99f8370cfd70de_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:5ba5a496e3d16db90aede1e74cc168fb2f13f665059e0d626a99f8370cfd70de_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:cc125c467c17953a31bfe5845598f3bbf730b0eb078d9e0e8ea627e32d116d1a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-observability-rhel8-operator@sha256:cc125c467c17953a31bfe5845598f3bbf730b0eb078d9e0e8ea627e32d116d1a_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:cc125c467c17953a31bfe5845598f3bbf730b0eb078d9e0e8ea627e32d116d1a_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:07c40c41d834d71fe6fcc08ef891dfcbcdafa801d8ee26c4a315b3c7d4c71349_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-application-rhel8@sha256:07c40c41d834d71fe6fcc08ef891dfcbcdafa801d8ee26c4a315b3c7d4c71349_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:07c40c41d834d71fe6fcc08ef891dfcbcdafa801d8ee26c4a315b3c7d4c71349_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:671c02a0d9fb1966238afda0e64affe038f5c32e421ccaa40f0da329a3b6df2b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-application-rhel8@sha256:671c02a0d9fb1966238afda0e64affe038f5c32e421ccaa40f0da329a3b6df2b_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:671c02a0d9fb1966238afda0e64affe038f5c32e421ccaa40f0da329a3b6df2b_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:38d8e305fa53afae1c0699bafdddb33472525d9c79e687915ae685de42ef5cc4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-channel-rhel8@sha256:38d8e305fa53afae1c0699bafdddb33472525d9c79e687915ae685de42ef5cc4_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:38d8e305fa53afae1c0699bafdddb33472525d9c79e687915ae685de42ef5cc4_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:bc69edc5133bb46357f6b46c25f36653fd42de9740a2cced7aea10e34b2f0cc8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-channel-rhel8@sha256:bc69edc5133bb46357f6b46c25f36653fd42de9740a2cced7aea10e34b2f0cc8_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:bc69edc5133bb46357f6b46c25f36653fd42de9740a2cced7aea10e34b2f0cc8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:49c70b19e22b140c837ebb6010d8d592dba1855a9cd07bbf33905110f8a962ce_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-deployable-rhel8@sha256:49c70b19e22b140c837ebb6010d8d592dba1855a9cd07bbf33905110f8a962ce_amd64" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:49c70b19e22b140c837ebb6010d8d592dba1855a9cd07bbf33905110f8a962ce_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:f681193db52645128b8e13bc087ad812b7d803f52421c4447ec4895fd86d948c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-deployable-rhel8@sha256:f681193db52645128b8e13bc087ad812b7d803f52421c4447ec4895fd86d948c_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:f681193db52645128b8e13bc087ad812b7d803f52421c4447ec4895fd86d948c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:649824f00f658b0614aab89b39332acee06ccdcc023149751f35e92adb5ab945_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-placementrule-rhel8@sha256:649824f00f658b0614aab89b39332acee06ccdcc023149751f35e92adb5ab945_amd64" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:649824f00f658b0614aab89b39332acee06ccdcc023149751f35e92adb5ab945_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:b6e66db32fcea05aee763785890e0828b64fd855c0c39b07cfdbdf9567983c2a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-placementrule-rhel8@sha256:b6e66db32fcea05aee763785890e0828b64fd855c0c39b07cfdbdf9567983c2a_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:b6e66db32fcea05aee763785890e0828b64fd855c0c39b07cfdbdf9567983c2a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:05192653c6d7f2830e4e146bfa0047488b4dd5d792f9e8b12a6ed10e6009d08c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:05192653c6d7f2830e4e146bfa0047488b4dd5d792f9e8b12a6ed10e6009d08c_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:05192653c6d7f2830e4e146bfa0047488b4dd5d792f9e8b12a6ed10e6009d08c_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:b276453aeba8606b708738a00ae1a8aa637140e350aaed25a512eb908e9a3141_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:b276453aeba8606b708738a00ae1a8aa637140e350aaed25a512eb908e9a3141_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:b276453aeba8606b708738a00ae1a8aa637140e350aaed25a512eb908e9a3141_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:8b803d2a406e26190f270372472d4b8a4f8f79e683b1f1ed0c7bc35bf6751f09_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:8b803d2a406e26190f270372472d4b8a4f8f79e683b1f1ed0c7bc35bf6751f09_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:8b803d2a406e26190f270372472d4b8a4f8f79e683b1f1ed0c7bc35bf6751f09_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:aff03be35e3de24ab5af37f7f319801c9b7809ac93cabad3c67519c64189897e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:aff03be35e3de24ab5af37f7f319801c9b7809ac93cabad3c67519c64189897e_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:aff03be35e3de24ab5af37f7f319801c9b7809ac93cabad3c67519c64189897e_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f318c2560a3493255c739b10ffdb2730d50a9c6d7c77323f82db1a678da7b4c9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:f318c2560a3493255c739b10ffdb2730d50a9c6d7c77323f82db1a678da7b4c9_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f318c2560a3493255c739b10ffdb2730d50a9c6d7c77323f82db1a678da7b4c9_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:7303d028baf414e8fc48e5148d8fdd7ee799f0400dbdd8c91fb6c2031ca1485f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multiclusterhub-repo-rhel8@sha256:7303d028baf414e8fc48e5148d8fdd7ee799f0400dbdd8c91fb6c2031ca1485f_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:7303d028baf414e8fc48e5148d8fdd7ee799f0400dbdd8c91fb6c2031ca1485f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:8b37ebb110341edb028da13358a0e25d21a59449b3f359ee3bf1c3f89af54a63_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multiclusterhub-repo-rhel8@sha256:8b37ebb110341edb028da13358a0e25d21a59449b3f359ee3bf1c3f89af54a63_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:8b37ebb110341edb028da13358a0e25d21a59449b3f359ee3bf1c3f89af54a63_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:63d9d2f2fd2f43d3b16f748a35c55617b4e150b79753ff7a2278060815a3d58c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multiclusterhub-rhel8@sha256:63d9d2f2fd2f43d3b16f748a35c55617b4e150b79753ff7a2278060815a3d58c_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:63d9d2f2fd2f43d3b16f748a35c55617b4e150b79753ff7a2278060815a3d58c_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:fa1eb816f320fc99d3c6031bcd59edc0e437fdf0d86c48f89c3101aaaff49550_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/multiclusterhub-rhel8@sha256:fa1eb816f320fc99d3c6031bcd59edc0e437fdf0d86c48f89c3101aaaff49550_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:fa1eb816f320fc99d3c6031bcd59edc0e437fdf0d86c48f89c3101aaaff49550_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:e4b7d3134aa49a1c93535ab6237eb7efec01bec229499309797772dfa2650910_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/observatorium-rhel8-operator@sha256:e4b7d3134aa49a1c93535ab6237eb7efec01bec229499309797772dfa2650910_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:e4b7d3134aa49a1c93535ab6237eb7efec01bec229499309797772dfa2650910_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:ffcaa9f390631225ddcbe349936193130c148c5c7040ee7a7d61dc94c3193bca_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/observatorium-rhel8-operator@sha256:ffcaa9f390631225ddcbe349936193130c148c5c7040ee7a7d61dc94c3193bca_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:ffcaa9f390631225ddcbe349936193130c148c5c7040ee7a7d61dc94c3193bca_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:0d8cf3c46573bc0c9db2f72e18b7692c5d537a8171b6e7a2f0c6416c001fe0b9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/observatorium-rhel8@sha256:0d8cf3c46573bc0c9db2f72e18b7692c5d537a8171b6e7a2f0c6416c001fe0b9_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:0d8cf3c46573bc0c9db2f72e18b7692c5d537a8171b6e7a2f0c6416c001fe0b9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:e9854b1d4e1a1c10ae28f560752fc2c8ad239b4c5d0bd8562cb0a8852776b115_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/observatorium-rhel8@sha256:e9854b1d4e1a1c10ae28f560752fc2c8ad239b4c5d0bd8562cb0a8852776b115_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:e9854b1d4e1a1c10ae28f560752fc2c8ad239b4c5d0bd8562cb0a8852776b115_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:02ea2b7e846d88c228dfbf2af479255fa50ddfd06ed572449fddeba6226a0258_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/openshift-hive-rhel8@sha256:02ea2b7e846d88c228dfbf2af479255fa50ddfd06ed572449fddeba6226a0258_ppc64le" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:02ea2b7e846d88c228dfbf2af479255fa50ddfd06ed572449fddeba6226a0258_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:8e8e1a3ddb874b1c8bc801f3da034798072a83c232fa90e3a6e328e382435fe8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/openshift-hive-rhel8@sha256:8e8e1a3ddb874b1c8bc801f3da034798072a83c232fa90e3a6e328e382435fe8_amd64" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:8e8e1a3ddb874b1c8bc801f3da034798072a83c232fa90e3a6e328e382435fe8_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:013c92ba798deafdb3d66528be5c8a5eebd3512c5a2c31940748b2de410875dc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/placement-rhel8@sha256:013c92ba798deafdb3d66528be5c8a5eebd3512c5a2c31940748b2de410875dc_ppc64le" }, "product_reference": "rhacm2/placement-rhel8@sha256:013c92ba798deafdb3d66528be5c8a5eebd3512c5a2c31940748b2de410875dc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:25339dd6aacf9778a75d794d0b12d1058bf6f9e3c7e7ccb998e04f75dec0c824_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/placement-rhel8@sha256:25339dd6aacf9778a75d794d0b12d1058bf6f9e3c7e7ccb998e04f75dec0c824_amd64" }, "product_reference": "rhacm2/placement-rhel8@sha256:25339dd6aacf9778a75d794d0b12d1058bf6f9e3c7e7ccb998e04f75dec0c824_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1c9e96a2e4a9e405abc29321e34d7492496f61089d63ccb5ac75967f5985591f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/prometheus-alertmanager-rhel8@sha256:1c9e96a2e4a9e405abc29321e34d7492496f61089d63ccb5ac75967f5985591f_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:1c9e96a2e4a9e405abc29321e34d7492496f61089d63ccb5ac75967f5985591f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:5041aebd780a81c1089f63d41f5452dce405c1a48cbe9601d4987c2cd0f545db_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/prometheus-alertmanager-rhel8@sha256:5041aebd780a81c1089f63d41f5452dce405c1a48cbe9601d4987c2cd0f545db_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:5041aebd780a81c1089f63d41f5452dce405c1a48cbe9601d4987c2cd0f545db_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:dd253eac64c3f09ff5b5f445afe9c470e35d99e516affc350eedc9c8ff684ac5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/provider-credential-controller-rhel8@sha256:dd253eac64c3f09ff5b5f445afe9c470e35d99e516affc350eedc9c8ff684ac5_amd64" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:dd253eac64c3f09ff5b5f445afe9c470e35d99e516affc350eedc9c8ff684ac5_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:dd3c6ddd835f225e3ccc3414bb7246d39585d2096953edf7b8773fd786c9cb85_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/provider-credential-controller-rhel8@sha256:dd3c6ddd835f225e3ccc3414bb7246d39585d2096953edf7b8773fd786c9cb85_ppc64le" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:dd3c6ddd835f225e3ccc3414bb7246d39585d2096953edf7b8773fd786c9cb85_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:34d3ea3226d97490b760c562ea94c26d0e575f715f2e571f93fe07e0b67a70cd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/rbac-query-proxy-rhel8@sha256:34d3ea3226d97490b760c562ea94c26d0e575f715f2e571f93fe07e0b67a70cd_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:34d3ea3226d97490b760c562ea94c26d0e575f715f2e571f93fe07e0b67a70cd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:81c96abd6e9d2226cad1a05d90c53b186421e95ce8a2fa19e7751ad60fac111f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/rbac-query-proxy-rhel8@sha256:81c96abd6e9d2226cad1a05d90c53b186421e95ce8a2fa19e7751ad60fac111f_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:81c96abd6e9d2226cad1a05d90c53b186421e95ce8a2fa19e7751ad60fac111f_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:794c69bb58199712b9f685e422a97b8f4ba3867670431367f53f77d55d735b9d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/redisgraph-tls-rhel8@sha256:794c69bb58199712b9f685e422a97b8f4ba3867670431367f53f77d55d735b9d_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:794c69bb58199712b9f685e422a97b8f4ba3867670431367f53f77d55d735b9d_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:a8dfa37c8980b40494101473e7c0f808e04245e34cd2b4fdd6e0f70a713e8d37_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/redisgraph-tls-rhel8@sha256:a8dfa37c8980b40494101473e7c0f808e04245e34cd2b4fdd6e0f70a713e8d37_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:a8dfa37c8980b40494101473e7c0f808e04245e34cd2b4fdd6e0f70a713e8d37_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:37255966c475174d79646e0e2f61c2c5728b925fb6f7931a24572687cc04dd7c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:37255966c475174d79646e0e2f61c2c5728b925fb6f7931a24572687cc04dd7c_amd64" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:37255966c475174d79646e0e2f61c2c5728b925fb6f7931a24572687cc04dd7c_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:95949eaaa1588e3c67d580ac91e5baf046074f90497d629f0a0b5cb59ee6605c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:95949eaaa1588e3c67d580ac91e5baf046074f90497d629f0a0b5cb59ee6605c_ppc64le" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:95949eaaa1588e3c67d580ac91e5baf046074f90497d629f0a0b5cb59ee6605c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:ec240366aea9063004433cd702d74cfc16020b478afe8f7070903005aba15461_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:ec240366aea9063004433cd702d74cfc16020b478afe8f7070903005aba15461_s390x" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:ec240366aea9063004433cd702d74cfc16020b478afe8f7070903005aba15461_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:1fc0c751515605fb9930fb053d5b596626bf97a818a218bab4a6afe8296ddd12_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:1fc0c751515605fb9930fb053d5b596626bf97a818a218bab4a6afe8296ddd12_ppc64le" }, "product_reference": "rhacm2/registration-rhel8@sha256:1fc0c751515605fb9930fb053d5b596626bf97a818a218bab4a6afe8296ddd12_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:90125ef36957dd46563547ba92288c1aeabaffca8da1412fbd0c040bd19907a2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:90125ef36957dd46563547ba92288c1aeabaffca8da1412fbd0c040bd19907a2_amd64" }, "product_reference": "rhacm2/registration-rhel8@sha256:90125ef36957dd46563547ba92288c1aeabaffca8da1412fbd0c040bd19907a2_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:b2b8859e33a00215f916243fccf98d7dcf1e3ed4c341d0b690a1bd919c9c6adc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:b2b8859e33a00215f916243fccf98d7dcf1e3ed4c341d0b690a1bd919c9c6adc_s390x" }, "product_reference": "rhacm2/registration-rhel8@sha256:b2b8859e33a00215f916243fccf98d7dcf1e3ed4c341d0b690a1bd919c9c6adc_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:6bf94d358b66666064d768e9c3fdf498becb62bd9dd9f1c3f287f5940effd648_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-aggregator-rhel8@sha256:6bf94d358b66666064d768e9c3fdf498becb62bd9dd9f1c3f287f5940effd648_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:6bf94d358b66666064d768e9c3fdf498becb62bd9dd9f1c3f287f5940effd648_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:cc15ad2f0a4274e6ce649ba96d5a8cfdda08ceb48c23ac764aa28f7a3e06d315_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-aggregator-rhel8@sha256:cc15ad2f0a4274e6ce649ba96d5a8cfdda08ceb48c23ac764aa28f7a3e06d315_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:cc15ad2f0a4274e6ce649ba96d5a8cfdda08ceb48c23ac764aa28f7a3e06d315_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:e5de357f6b3074136b23491b9f4a7ae5445c5f9b376fe2231e49ac7aa6e2daec_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-api-rhel8@sha256:e5de357f6b3074136b23491b9f4a7ae5445c5f9b376fe2231e49ac7aa6e2daec_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:e5de357f6b3074136b23491b9f4a7ae5445c5f9b376fe2231e49ac7aa6e2daec_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:ff0b767f49ad6c5cadd8e41155b3906fa4a64554d5629809bbcefd4a5da52ad0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-api-rhel8@sha256:ff0b767f49ad6c5cadd8e41155b3906fa4a64554d5629809bbcefd4a5da52ad0_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:ff0b767f49ad6c5cadd8e41155b3906fa4a64554d5629809bbcefd4a5da52ad0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:047c09e212d1c3d24b70c0e78c8c0cbd55c13a3b0f8bc74d0a11debffaf2bdaf_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:047c09e212d1c3d24b70c0e78c8c0cbd55c13a3b0f8bc74d0a11debffaf2bdaf_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:047c09e212d1c3d24b70c0e78c8c0cbd55c13a3b0f8bc74d0a11debffaf2bdaf_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:804f7341a1b7159736025aa41041ee04a4cec0a494635a01ffb542845dbe27dc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:804f7341a1b7159736025aa41041ee04a4cec0a494635a01ffb542845dbe27dc_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:804f7341a1b7159736025aa41041ee04a4cec0a494635a01ffb542845dbe27dc_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:9f49b4e0d3d6d993e8ff043fa396bc692ca0f50b5354f422ef45368a2207d9f2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:9f49b4e0d3d6d993e8ff043fa396bc692ca0f50b5354f422ef45368a2207d9f2_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:9f49b4e0d3d6d993e8ff043fa396bc692ca0f50b5354f422ef45368a2207d9f2_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:1c2adeaacb3eb9eed3fe20cc6c1f83e75498cc754645d26b84bff7c2204599aa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-rhel8@sha256:1c2adeaacb3eb9eed3fe20cc6c1f83e75498cc754645d26b84bff7c2204599aa_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:1c2adeaacb3eb9eed3fe20cc6c1f83e75498cc754645d26b84bff7c2204599aa_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:3d823a648bd61b0c5b7e7f7ff7b7e6b3ebb3718885aff1b05425ac40cec9fa05_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-rhel8@sha256:3d823a648bd61b0c5b7e7f7ff7b7e6b3ebb3718885aff1b05425ac40cec9fa05_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:3d823a648bd61b0c5b7e7f7ff7b7e6b3ebb3718885aff1b05425ac40cec9fa05_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:9773164120f0a5966df9e2a352a6d49a442f00992ed179ad6c14ab99e4c7bff0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-ui-rhel8@sha256:9773164120f0a5966df9e2a352a6d49a442f00992ed179ad6c14ab99e4c7bff0_amd64" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:9773164120f0a5966df9e2a352a6d49a442f00992ed179ad6c14ab99e4c7bff0_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:c0b8e5d43945d0e251fcbb1ee26b9c4c0610de96ef345c4fdd1bc64fae6dd444_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/search-ui-rhel8@sha256:c0b8e5d43945d0e251fcbb1ee26b9c4c0610de96ef345c4fdd1bc64fae6dd444_ppc64le" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:c0b8e5d43945d0e251fcbb1ee26b9c4c0610de96ef345c4fdd1bc64fae6dd444_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:8791a21c0396c374e2791a23716f643947bfd742fe56f5483336d29ee57750ca_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/submariner-addon-rhel8@sha256:8791a21c0396c374e2791a23716f643947bfd742fe56f5483336d29ee57750ca_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:8791a21c0396c374e2791a23716f643947bfd742fe56f5483336d29ee57750ca_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:b5a27b3f7bfb3f3ca65f7b7515de800516b9e73758f77a58dd86839254e3e2b8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/submariner-addon-rhel8@sha256:b5a27b3f7bfb3f3ca65f7b7515de800516b9e73758f77a58dd86839254e3e2b8_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:b5a27b3f7bfb3f3ca65f7b7515de800516b9e73758f77a58dd86839254e3e2b8_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:7a78d3a5e5323721ea89fe43e965a2b796c0b340ef5dfe7e4f1d1f8ddfe72a3a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/thanos-receive-controller-rhel8@sha256:7a78d3a5e5323721ea89fe43e965a2b796c0b340ef5dfe7e4f1d1f8ddfe72a3a_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:7a78d3a5e5323721ea89fe43e965a2b796c0b340ef5dfe7e4f1d1f8ddfe72a3a_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:df4ad638a80c673121997ef8054893cc9d6968e706211df807c31da43aa6c0e6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/thanos-receive-controller-rhel8@sha256:df4ad638a80c673121997ef8054893cc9d6968e706211df807c31da43aa6c0e6_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:df4ad638a80c673121997ef8054893cc9d6968e706211df807c31da43aa6c0e6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:30db88c9eca70c76e985bec24b138d1f88b9c06d7f43f2280b94d491dc5b245c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:30db88c9eca70c76e985bec24b138d1f88b9c06d7f43f2280b94d491dc5b245c_s390x" }, "product_reference": "rhacm2/work-rhel8@sha256:30db88c9eca70c76e985bec24b138d1f88b9c06d7f43f2280b94d491dc5b245c_s390x", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:76b83815e514e340417fb5eb1bb82c342734e18813d92ab86dbfe29ff65e084c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:76b83815e514e340417fb5eb1bb82c342734e18813d92ab86dbfe29ff65e084c_amd64" }, "product_reference": "rhacm2/work-rhel8@sha256:76b83815e514e340417fb5eb1bb82c342734e18813d92ab86dbfe29ff65e084c_amd64", "relates_to_product_reference": "8Base-RHACM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:c72c6a08cc557ac85d2690e7e8996db98c70545c64348432780858a90c017610_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8", "product_id": "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:c72c6a08cc557ac85d2690e7e8996db98c70545c64348432780858a90c017610_ppc64le" }, "product_reference": "rhacm2/work-rhel8@sha256:c72c6a08cc557ac85d2690e7e8996db98c70545c64348432780858a90c017610_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHACM-2.3:rhacm2/management-ingress-rhel7@sha256:b798d8f17236c6a809377d1dbc14e76686919986ed8ea4035629c7dcfeea9a14_ppc64le", "7Server-RHACM-2.3:rhacm2/management-ingress-rhel7@sha256:f5fdd5f3b34c59d7d1eb73a26e056a24ff003825e528535d0acf3f4b205766a2_amd64", "7Server-RHACM-2.3:rhacm2/memcached-exporter-rhel7@sha256:88e14f3bd185d0158ead6bd41f1805320b55ed55a7ab7cb823418bbb075c1fe7_ppc64le", "7Server-RHACM-2.3:rhacm2/memcached-exporter-rhel7@sha256:abe82a77c0b20434fd9e30bb4f50c4be43e407e6eee1f824ecf045a89f113757_amd64", "7Server-RHACM-2.3:rhacm2/thanos-rhel7@sha256:53ad20b1f040d85041657efc95a05f8477386fe1735d7c96e8ba07a05fa9b2be_amd64", "7Server-RHACM-2.3:rhacm2/thanos-rhel7@sha256:7e9c9a46abd9e00b2e77d06583ca2644c21ed64cc89baadc51e00934613fe1a2_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-grafana-rhel8@sha256:5462f1cb074c593dec22d2b32ac23039155598260f5d4ee332c66cfe8195f207_amd64", "8Base-RHACM-2.3:rhacm2/acm-grafana-rhel8@sha256:9725c9180f597eb6615404f672ffeecd04f639cfd3c6097d91bb6ff636efb0d2_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-must-gather-rhel8@sha256:800f487f71b2d65361af1b86bdd054643718321098cbecf0789717105394a6af_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-must-gather-rhel8@sha256:cafbda0901580bb72a2613d15ee658927da0f7bfa5ea1423332c5de95e698041_amd64", "8Base-RHACM-2.3:rhacm2/acm-operator-bundle@sha256:a45e23fdcfa02c1841152e352f58aea50c359ff442d3d3896e9ae0280996ba99_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-operator-bundle@sha256:c66c1d55806626b477bb32bff202b6b75089e98099400975fc99b1e3db4e69b1_amd64", "8Base-RHACM-2.3:rhacm2/agent-service-rhel8@sha256:489d60ec5e6eda1b49c7a480e0f0e586a0b274d07df48d624e48b69b85f31e16_amd64", "8Base-RHACM-2.3:rhacm2/agent-service-rhel8@sha256:9e13b8a4610b11815be84028bf7de9355f75402699d6f1b6cbb4a98cbaacfe41_ppc64le", "8Base-RHACM-2.3:rhacm2/application-ui-rhel8@sha256:3224179c171ba87c58ad417a94443fcea0b0619aa8f4b970825cad44e534a347_ppc64le", "8Base-RHACM-2.3:rhacm2/application-ui-rhel8@sha256:cb8936e165acd1b9072da825c783a81ca6823da3b79391e386716904b8c982bc_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-agent-rhel8@sha256:7299da84e5dc26da48a7ee9780b01c1642ab7b930fa3722ee170c1a78d3a0afa_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-reporter-rhel8@sha256:2e96d4022f3f0270f197c75881ba8c168961652ccc60f58a014cddb9cfb2e497_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-reporter-rhel8@sha256:9675875122b5001393ef4e6a6ac7bafdee592c8c9bc91fcd0a71acd57e3750bb_ppc64le", "8Base-RHACM-2.3:rhacm2/assisted-installer-rhel8@sha256:dd4d3e2948ab564b21a5aaa5a0242feed99b70cfde44a7bddcfa4b2173609602_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-rhel8@sha256:f501f4bc0a9e3acd86eca2c05d1b6dae90e03d060015a94c32ce31f903372d5c_ppc64le", "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:549deeeb6f619a12e2162f40aa17e67c9f3e3492970ca1bba4509d6176a9fb54_amd64", "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:6b53a0c151a6fc5b066eb0c4afe057b653ff76227b9c223a3eafb74157454d2d_s390x", "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:6d1fe4fad43f7f1321f87ed456716f41bb1b24eb00fd66f9758152b566b168c6_ppc64le", "8Base-RHACM-2.3:rhacm2/cluster-curator-controller-rhel8@sha256:bb88a0bf65a8b938bd0ebdbebdae79be60f0ecc4f4a69025e2ffee17154dda6e_ppc64le", "8Base-RHACM-2.3:rhacm2/cluster-curator-controller-rhel8@sha256:d6a147d1a02f4c702b25a3d5b92fed131e94f7d34227f33c6910e255a4c61127_amd64", "8Base-RHACM-2.3:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e3057346b858ce63922b46f8bcbca952cf83e66db24ab1f137a8fb1378795a8_ppc64le", "8Base-RHACM-2.3:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:9c52a4d57bb174e8b4c2fb6793ac94b087e0cc6cb24ea1480052ce430369370e_amd64", "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:7da556098e5e536a92792062f18798d8b4b4c5e43d961eaa545b4360d8a74492_amd64", "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:a51a956bbac51ae096d32a373bfbcc520e8926be3608e05744b04ccf1e33f71e_s390x", "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:c5772c181334a58c44dff660be5feede0b08f6bfce5e5ab9bc59117db40e10ef_ppc64le", "8Base-RHACM-2.3:rhacm2/console-api-rhel8@sha256:03099e106fe591e230f5ff47a90ce9e475575b4cd32f16fdd230e70c65128e77_ppc64le", "8Base-RHACM-2.3:rhacm2/console-api-rhel8@sha256:534dd3df29b0a59a766a1e0ac6e0d04376d9dfbfbf4bece508f147b60a8bc9fd_amd64", "8Base-RHACM-2.3:rhacm2/discovery-rhel8-operator@sha256:219c952dcb29b569ccb1d318a73cd08d0c5f55e20000b4a852f5454b18dd8aa5_ppc64le", "8Base-RHACM-2.3:rhacm2/discovery-rhel8-operator@sha256:a8683ec8eddb7509155b8935b19e4ec33a6fa5870ae0126e8d885e5dfbb2221a_amd64", "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:3e6b3b09fe10fff48cd4de7e4de95d68c460e51019f25f4523339e0eda028eec_ppc64le", "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:8a223c90fd554a36c8ec26c463ca895568364f550b2921f13e3498a4f0dee636_amd64", "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c852e42dd5193ad1c7d056c9b635f29a791c4a16b43459a61196fc532f64a810_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-propagator-rhel8@sha256:da1bb14e382749fb72f08c23366df733e5804229ce8265fa8029d18eb6ad10b9_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-propagator-rhel8@sha256:f4f6a958f47633afc47cb92349e9fdf653b052a4f84106f3f06ff590071e47f5_ppc64le", "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c96db8365c173bb434222da23b7ea536e6d48cbfc59b8ea5da7191d81116188_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:987f8b16c73bbdb4633118aaf88df560bced0f98e958a6b0359789adecc17274_ppc64le", "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:ca3e6dbf9e8859fa4ca2562feccc457989a761143e849dafcefad7128c046ac0_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:694b1ec5af7c84d439a3a9a6ccf6f6c1325cdcd6d726107c2d533f8bb4e0a659_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:9703e634221ffcc6bb43e7757eb88ace944941943e287a989572bc4ed2ac87dd_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:c4a5f9877fe1aadac666ee57737dc9c06d3281c8296f41ece7d4cbbca35b5760_ppc64le", "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:1f969dd1a416c5a502642e0b6f26b23f6feb08ce882dc0c767332e3e6155fda0_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:d7d044b26a46d497885f9cbe3da2b82793a822709f9b949a628553ecec9c6be9_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:e68013d7277592ed091338ba470c84290b7e5f6fe5f72611d5368ec6759fb9ba_ppc64le", "8Base-RHACM-2.3:rhacm2/grafana-dashboard-loader-rhel8@sha256:719492a71598de1c02b90ece7e0205d29e51e4d1422b578f1ab1de6df2c51f31_ppc64le", "8Base-RHACM-2.3:rhacm2/grafana-dashboard-loader-rhel8@sha256:98a728704ae8914fa30865c432eabdf3bb0079ad36889f7ef267637d8b77ce58_amd64", "8Base-RHACM-2.3:rhacm2/grc-ui-api-rhel8@sha256:b7c7b8188a428be1e3fdcf999a5383ff01ce5f62952b4bce115160109bd535b7_ppc64le", "8Base-RHACM-2.3:rhacm2/grc-ui-api-rhel8@sha256:eb683ca36fbda111a78919ae7c116c1eb25b7381d4bd832677fe7ffa1e8a9ae9_amd64", "8Base-RHACM-2.3:rhacm2/grc-ui-rhel8@sha256:7fff192d63fcec1c7269bd33a930af85b5e8970903b2c9adbafd27c846ede149_amd64", "8Base-RHACM-2.3:rhacm2/grc-ui-rhel8@sha256:c8ab69260af4bb6de5704478f642309c8aa9e2acd54c5b1523403e4ac2e6e3ba_ppc64le", "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:33f309345b50f763a60d4214f8e81ebe247e5e08e5d47123e49027e045153ff4_s390x", "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:7420fe81f62c35e368a6475afb5cb3259122f20d863841432f79783ca3aa98b8_amd64", "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:d837fb83dfca6fcb7313810861539ca5885e3a0f47e924f7dbb979cea63c40be_ppc64le", "8Base-RHACM-2.3:rhacm2/insights-client-rhel8@sha256:6a98f068ff319a152ed9f9219b8d10f1fb2ba51dbf7df816a39ddf1b848544f9_ppc64le", "8Base-RHACM-2.3:rhacm2/insights-client-rhel8@sha256:6c25434471cae697b263c7bc1c0c897169770d3f0781bf22721ec9d1f53ef4bd_amd64", "8Base-RHACM-2.3:rhacm2/insights-metrics-rhel8@sha256:9e652db1d8f54105b06184fb6f6009339dd17330914efd6f236bea8182bbf1a6_amd64", "8Base-RHACM-2.3:rhacm2/insights-metrics-rhel8@sha256:d14c9d35c3cf30a852d3a797527af5a8934ba244be03672f21cd50279fe5224c_ppc64le", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-controller-rhel8@sha256:b69cbdc8fb3b2a96b2a36eeebc81c1d835baf0dfdd915034f75acb2bd1cec265_amd64", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-controller-rhel8@sha256:c5660dcdf2383e3eab04388f7ef304390da4d6c936cd205d1bd6d9106b64750e_ppc64le", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:31186b499dca641bd7f18ed9ba12393e0d7fe5adb0d8f7359ed14611493f0911_amd64", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b941671138970358867ef95af1c9060e0b14b9918304ed228f1af0c64e32b7f_ppc64le", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:ed671a0763bc5a91e570d0124536b26a0e64ca85c3328fc34b00695488789993_s390x", "8Base-RHACM-2.3:rhacm2/kui-web-terminal-rhel8@sha256:8e1d64a7eea72bd0e5ff7b49acef73789caabc73fdf32a7a6a4ea890e01a1432_amd64", "8Base-RHACM-2.3:rhacm2/kui-web-terminal-rhel8@sha256:f0e10c0fd8fd63d63e4bd77737570dddd8411b222c48a768233d3efcd68db540_ppc64le", "8Base-RHACM-2.3:rhacm2/managedcluster-import-controller-rhel8@sha256:07dac07aac995190fa215b35498f71370070a16dc483628c1acbeed8489772e7_amd64", "8Base-RHACM-2.3:rhacm2/managedcluster-import-controller-rhel8@sha256:21637cf2186a93bdbab90daeb0454bf8a100822ec349bed411636d914c702248_ppc64le", "8Base-RHACM-2.3:rhacm2/memcached-rhel8@sha256:34a257ffa28c71140baf1582dff07e021cd332e63c0787dfa3e807f1abbc9cbc_ppc64le", "8Base-RHACM-2.3:rhacm2/memcached-rhel8@sha256:635a1bdca4856fe4274e990ffe1beac888c258f1d463b11e7a0ed8c9d715b467_amd64", "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:2643d16445229c534adabfd0aff3f315369d6cd39f12eef432df0c323a6e9c93_s390x", "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:6349b661ed0a32f147234448493bf9e8b9193b8e286aca85ea419893992d72ae_ppc64le", "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:7cf6fc798ecd6035a7274b1901b71159656c4ac2b8b03595023e57ab656970a4_amd64", "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:9cfaa207ccdfcfe2dacb250502f7a1bfe06c168a0f3d5c2f796922d86295d0bf_amd64", "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:c9a5defd921604b3afd2ebcb81ac565812b2bf49f69365f8b0d5debad355bdae_ppc64le", "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:fc0c2f42b1f5e161b1e8bf02317d5a955faad69626b99c3e2bd14bf25a037641_s390x", "8Base-RHACM-2.3:rhacm2/multicluster-observability-rhel8-operator@sha256:5ba5a496e3d16db90aede1e74cc168fb2f13f665059e0d626a99f8370cfd70de_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-observability-rhel8-operator@sha256:cc125c467c17953a31bfe5845598f3bbf730b0eb078d9e0e8ea627e32d116d1a_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-application-rhel8@sha256:07c40c41d834d71fe6fcc08ef891dfcbcdafa801d8ee26c4a315b3c7d4c71349_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-application-rhel8@sha256:671c02a0d9fb1966238afda0e64affe038f5c32e421ccaa40f0da329a3b6df2b_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-channel-rhel8@sha256:38d8e305fa53afae1c0699bafdddb33472525d9c79e687915ae685de42ef5cc4_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-channel-rhel8@sha256:bc69edc5133bb46357f6b46c25f36653fd42de9740a2cced7aea10e34b2f0cc8_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-deployable-rhel8@sha256:49c70b19e22b140c837ebb6010d8d592dba1855a9cd07bbf33905110f8a962ce_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-deployable-rhel8@sha256:f681193db52645128b8e13bc087ad812b7d803f52421c4447ec4895fd86d948c_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-placementrule-rhel8@sha256:649824f00f658b0614aab89b39332acee06ccdcc023149751f35e92adb5ab945_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-placementrule-rhel8@sha256:b6e66db32fcea05aee763785890e0828b64fd855c0c39b07cfdbdf9567983c2a_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:05192653c6d7f2830e4e146bfa0047488b4dd5d792f9e8b12a6ed10e6009d08c_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:b276453aeba8606b708738a00ae1a8aa637140e350aaed25a512eb908e9a3141_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:8b803d2a406e26190f270372472d4b8a4f8f79e683b1f1ed0c7bc35bf6751f09_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:aff03be35e3de24ab5af37f7f319801c9b7809ac93cabad3c67519c64189897e_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:f318c2560a3493255c739b10ffdb2730d50a9c6d7c77323f82db1a678da7b4c9_s390x", "8Base-RHACM-2.3:rhacm2/multiclusterhub-repo-rhel8@sha256:7303d028baf414e8fc48e5148d8fdd7ee799f0400dbdd8c91fb6c2031ca1485f_ppc64le", "8Base-RHACM-2.3:rhacm2/multiclusterhub-repo-rhel8@sha256:8b37ebb110341edb028da13358a0e25d21a59449b3f359ee3bf1c3f89af54a63_amd64", "8Base-RHACM-2.3:rhacm2/multiclusterhub-rhel8@sha256:63d9d2f2fd2f43d3b16f748a35c55617b4e150b79753ff7a2278060815a3d58c_amd64", "8Base-RHACM-2.3:rhacm2/multiclusterhub-rhel8@sha256:fa1eb816f320fc99d3c6031bcd59edc0e437fdf0d86c48f89c3101aaaff49550_ppc64le", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8-operator@sha256:e4b7d3134aa49a1c93535ab6237eb7efec01bec229499309797772dfa2650910_amd64", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8-operator@sha256:ffcaa9f390631225ddcbe349936193130c148c5c7040ee7a7d61dc94c3193bca_ppc64le", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8@sha256:0d8cf3c46573bc0c9db2f72e18b7692c5d537a8171b6e7a2f0c6416c001fe0b9_ppc64le", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8@sha256:e9854b1d4e1a1c10ae28f560752fc2c8ad239b4c5d0bd8562cb0a8852776b115_amd64", "8Base-RHACM-2.3:rhacm2/openshift-hive-rhel8@sha256:02ea2b7e846d88c228dfbf2af479255fa50ddfd06ed572449fddeba6226a0258_ppc64le", "8Base-RHACM-2.3:rhacm2/openshift-hive-rhel8@sha256:8e8e1a3ddb874b1c8bc801f3da034798072a83c232fa90e3a6e328e382435fe8_amd64", "8Base-RHACM-2.3:rhacm2/placement-rhel8@sha256:013c92ba798deafdb3d66528be5c8a5eebd3512c5a2c31940748b2de410875dc_ppc64le", "8Base-RHACM-2.3:rhacm2/placement-rhel8@sha256:25339dd6aacf9778a75d794d0b12d1058bf6f9e3c7e7ccb998e04f75dec0c824_amd64", "8Base-RHACM-2.3:rhacm2/prometheus-alertmanager-rhel8@sha256:1c9e96a2e4a9e405abc29321e34d7492496f61089d63ccb5ac75967f5985591f_ppc64le", "8Base-RHACM-2.3:rhacm2/prometheus-alertmanager-rhel8@sha256:5041aebd780a81c1089f63d41f5452dce405c1a48cbe9601d4987c2cd0f545db_amd64", "8Base-RHACM-2.3:rhacm2/provider-credential-controller-rhel8@sha256:dd253eac64c3f09ff5b5f445afe9c470e35d99e516affc350eedc9c8ff684ac5_amd64", "8Base-RHACM-2.3:rhacm2/provider-credential-controller-rhel8@sha256:dd3c6ddd835f225e3ccc3414bb7246d39585d2096953edf7b8773fd786c9cb85_ppc64le", "8Base-RHACM-2.3:rhacm2/rbac-query-proxy-rhel8@sha256:34d3ea3226d97490b760c562ea94c26d0e575f715f2e571f93fe07e0b67a70cd_ppc64le", "8Base-RHACM-2.3:rhacm2/rbac-query-proxy-rhel8@sha256:81c96abd6e9d2226cad1a05d90c53b186421e95ce8a2fa19e7751ad60fac111f_amd64", "8Base-RHACM-2.3:rhacm2/redisgraph-tls-rhel8@sha256:794c69bb58199712b9f685e422a97b8f4ba3867670431367f53f77d55d735b9d_amd64", "8Base-RHACM-2.3:rhacm2/redisgraph-tls-rhel8@sha256:a8dfa37c8980b40494101473e7c0f808e04245e34cd2b4fdd6e0f70a713e8d37_ppc64le", "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:37255966c475174d79646e0e2f61c2c5728b925fb6f7931a24572687cc04dd7c_amd64", "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:95949eaaa1588e3c67d580ac91e5baf046074f90497d629f0a0b5cb59ee6605c_ppc64le", "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:ec240366aea9063004433cd702d74cfc16020b478afe8f7070903005aba15461_s390x", "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:1fc0c751515605fb9930fb053d5b596626bf97a818a218bab4a6afe8296ddd12_ppc64le", "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:90125ef36957dd46563547ba92288c1aeabaffca8da1412fbd0c040bd19907a2_amd64", "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:b2b8859e33a00215f916243fccf98d7dcf1e3ed4c341d0b690a1bd919c9c6adc_s390x", "8Base-RHACM-2.3:rhacm2/search-aggregator-rhel8@sha256:6bf94d358b66666064d768e9c3fdf498becb62bd9dd9f1c3f287f5940effd648_ppc64le", "8Base-RHACM-2.3:rhacm2/search-aggregator-rhel8@sha256:cc15ad2f0a4274e6ce649ba96d5a8cfdda08ceb48c23ac764aa28f7a3e06d315_amd64", "8Base-RHACM-2.3:rhacm2/search-api-rhel8@sha256:e5de357f6b3074136b23491b9f4a7ae5445c5f9b376fe2231e49ac7aa6e2daec_amd64", "8Base-RHACM-2.3:rhacm2/search-api-rhel8@sha256:ff0b767f49ad6c5cadd8e41155b3906fa4a64554d5629809bbcefd4a5da52ad0_ppc64le", "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:047c09e212d1c3d24b70c0e78c8c0cbd55c13a3b0f8bc74d0a11debffaf2bdaf_ppc64le", "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:804f7341a1b7159736025aa41041ee04a4cec0a494635a01ffb542845dbe27dc_amd64", "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:9f49b4e0d3d6d993e8ff043fa396bc692ca0f50b5354f422ef45368a2207d9f2_s390x", "8Base-RHACM-2.3:rhacm2/search-rhel8@sha256:1c2adeaacb3eb9eed3fe20cc6c1f83e75498cc754645d26b84bff7c2204599aa_amd64", "8Base-RHACM-2.3:rhacm2/search-rhel8@sha256:3d823a648bd61b0c5b7e7f7ff7b7e6b3ebb3718885aff1b05425ac40cec9fa05_ppc64le", "8Base-RHACM-2.3:rhacm2/search-ui-rhel8@sha256:9773164120f0a5966df9e2a352a6d49a442f00992ed179ad6c14ab99e4c7bff0_amd64", "8Base-RHACM-2.3:rhacm2/search-ui-rhel8@sha256:c0b8e5d43945d0e251fcbb1ee26b9c4c0610de96ef345c4fdd1bc64fae6dd444_ppc64le", "8Base-RHACM-2.3:rhacm2/submariner-addon-rhel8@sha256:8791a21c0396c374e2791a23716f643947bfd742fe56f5483336d29ee57750ca_ppc64le", "8Base-RHACM-2.3:rhacm2/submariner-addon-rhel8@sha256:b5a27b3f7bfb3f3ca65f7b7515de800516b9e73758f77a58dd86839254e3e2b8_amd64", "8Base-RHACM-2.3:rhacm2/thanos-receive-controller-rhel8@sha256:7a78d3a5e5323721ea89fe43e965a2b796c0b340ef5dfe7e4f1d1f8ddfe72a3a_amd64", "8Base-RHACM-2.3:rhacm2/thanos-receive-controller-rhel8@sha256:df4ad638a80c673121997ef8054893cc9d6968e706211df807c31da43aa6c0e6_ppc64le", "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:30db88c9eca70c76e985bec24b138d1f88b9c06d7f43f2280b94d491dc5b245c_s390x", "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:76b83815e514e340417fb5eb1bb82c342734e18813d92ab86dbfe29ff65e084c_amd64", "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:c72c6a08cc557ac85d2690e7e8996db98c70545c64348432780858a90c017610_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.3:rhacm2/console-rhel8@sha256:2f090e167fa9bace7e3dbac425921bcdbf415d454de99d868a14226862888945_amd64", "8Base-RHACM-2.3:rhacm2/console-rhel8@sha256:e93a19a6c0db798b328d7d921870dc597a90f3b829ce481b6cae952289da19b0_ppc64le" ], "known_not_affected": [ "7Server-RHACM-2.3:rhacm2/management-ingress-rhel7@sha256:b798d8f17236c6a809377d1dbc14e76686919986ed8ea4035629c7dcfeea9a14_ppc64le", "7Server-RHACM-2.3:rhacm2/management-ingress-rhel7@sha256:f5fdd5f3b34c59d7d1eb73a26e056a24ff003825e528535d0acf3f4b205766a2_amd64", "7Server-RHACM-2.3:rhacm2/memcached-exporter-rhel7@sha256:88e14f3bd185d0158ead6bd41f1805320b55ed55a7ab7cb823418bbb075c1fe7_ppc64le", "7Server-RHACM-2.3:rhacm2/memcached-exporter-rhel7@sha256:abe82a77c0b20434fd9e30bb4f50c4be43e407e6eee1f824ecf045a89f113757_amd64", "7Server-RHACM-2.3:rhacm2/thanos-rhel7@sha256:53ad20b1f040d85041657efc95a05f8477386fe1735d7c96e8ba07a05fa9b2be_amd64", "7Server-RHACM-2.3:rhacm2/thanos-rhel7@sha256:7e9c9a46abd9e00b2e77d06583ca2644c21ed64cc89baadc51e00934613fe1a2_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-grafana-rhel8@sha256:5462f1cb074c593dec22d2b32ac23039155598260f5d4ee332c66cfe8195f207_amd64", "8Base-RHACM-2.3:rhacm2/acm-grafana-rhel8@sha256:9725c9180f597eb6615404f672ffeecd04f639cfd3c6097d91bb6ff636efb0d2_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-must-gather-rhel8@sha256:800f487f71b2d65361af1b86bdd054643718321098cbecf0789717105394a6af_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-must-gather-rhel8@sha256:cafbda0901580bb72a2613d15ee658927da0f7bfa5ea1423332c5de95e698041_amd64", "8Base-RHACM-2.3:rhacm2/acm-operator-bundle@sha256:a45e23fdcfa02c1841152e352f58aea50c359ff442d3d3896e9ae0280996ba99_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-operator-bundle@sha256:c66c1d55806626b477bb32bff202b6b75089e98099400975fc99b1e3db4e69b1_amd64", "8Base-RHACM-2.3:rhacm2/agent-service-rhel8@sha256:489d60ec5e6eda1b49c7a480e0f0e586a0b274d07df48d624e48b69b85f31e16_amd64", "8Base-RHACM-2.3:rhacm2/agent-service-rhel8@sha256:9e13b8a4610b11815be84028bf7de9355f75402699d6f1b6cbb4a98cbaacfe41_ppc64le", "8Base-RHACM-2.3:rhacm2/application-ui-rhel8@sha256:3224179c171ba87c58ad417a94443fcea0b0619aa8f4b970825cad44e534a347_ppc64le", "8Base-RHACM-2.3:rhacm2/application-ui-rhel8@sha256:cb8936e165acd1b9072da825c783a81ca6823da3b79391e386716904b8c982bc_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-agent-rhel8@sha256:7299da84e5dc26da48a7ee9780b01c1642ab7b930fa3722ee170c1a78d3a0afa_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-reporter-rhel8@sha256:2e96d4022f3f0270f197c75881ba8c168961652ccc60f58a014cddb9cfb2e497_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-reporter-rhel8@sha256:9675875122b5001393ef4e6a6ac7bafdee592c8c9bc91fcd0a71acd57e3750bb_ppc64le", "8Base-RHACM-2.3:rhacm2/assisted-installer-rhel8@sha256:dd4d3e2948ab564b21a5aaa5a0242feed99b70cfde44a7bddcfa4b2173609602_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-rhel8@sha256:f501f4bc0a9e3acd86eca2c05d1b6dae90e03d060015a94c32ce31f903372d5c_ppc64le", "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:549deeeb6f619a12e2162f40aa17e67c9f3e3492970ca1bba4509d6176a9fb54_amd64", "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:6b53a0c151a6fc5b066eb0c4afe057b653ff76227b9c223a3eafb74157454d2d_s390x", "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:6d1fe4fad43f7f1321f87ed456716f41bb1b24eb00fd66f9758152b566b168c6_ppc64le", "8Base-RHACM-2.3:rhacm2/cluster-curator-controller-rhel8@sha256:bb88a0bf65a8b938bd0ebdbebdae79be60f0ecc4f4a69025e2ffee17154dda6e_ppc64le", "8Base-RHACM-2.3:rhacm2/cluster-curator-controller-rhel8@sha256:d6a147d1a02f4c702b25a3d5b92fed131e94f7d34227f33c6910e255a4c61127_amd64", "8Base-RHACM-2.3:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e3057346b858ce63922b46f8bcbca952cf83e66db24ab1f137a8fb1378795a8_ppc64le", "8Base-RHACM-2.3:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:9c52a4d57bb174e8b4c2fb6793ac94b087e0cc6cb24ea1480052ce430369370e_amd64", "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:7da556098e5e536a92792062f18798d8b4b4c5e43d961eaa545b4360d8a74492_amd64", "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:a51a956bbac51ae096d32a373bfbcc520e8926be3608e05744b04ccf1e33f71e_s390x", "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:c5772c181334a58c44dff660be5feede0b08f6bfce5e5ab9bc59117db40e10ef_ppc64le", "8Base-RHACM-2.3:rhacm2/console-api-rhel8@sha256:03099e106fe591e230f5ff47a90ce9e475575b4cd32f16fdd230e70c65128e77_ppc64le", "8Base-RHACM-2.3:rhacm2/console-api-rhel8@sha256:534dd3df29b0a59a766a1e0ac6e0d04376d9dfbfbf4bece508f147b60a8bc9fd_amd64", "8Base-RHACM-2.3:rhacm2/discovery-rhel8-operator@sha256:219c952dcb29b569ccb1d318a73cd08d0c5f55e20000b4a852f5454b18dd8aa5_ppc64le", "8Base-RHACM-2.3:rhacm2/discovery-rhel8-operator@sha256:a8683ec8eddb7509155b8935b19e4ec33a6fa5870ae0126e8d885e5dfbb2221a_amd64", "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:3e6b3b09fe10fff48cd4de7e4de95d68c460e51019f25f4523339e0eda028eec_ppc64le", "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:8a223c90fd554a36c8ec26c463ca895568364f550b2921f13e3498a4f0dee636_amd64", "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c852e42dd5193ad1c7d056c9b635f29a791c4a16b43459a61196fc532f64a810_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-propagator-rhel8@sha256:da1bb14e382749fb72f08c23366df733e5804229ce8265fa8029d18eb6ad10b9_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-propagator-rhel8@sha256:f4f6a958f47633afc47cb92349e9fdf653b052a4f84106f3f06ff590071e47f5_ppc64le", "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c96db8365c173bb434222da23b7ea536e6d48cbfc59b8ea5da7191d81116188_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:987f8b16c73bbdb4633118aaf88df560bced0f98e958a6b0359789adecc17274_ppc64le", "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:ca3e6dbf9e8859fa4ca2562feccc457989a761143e849dafcefad7128c046ac0_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:694b1ec5af7c84d439a3a9a6ccf6f6c1325cdcd6d726107c2d533f8bb4e0a659_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:9703e634221ffcc6bb43e7757eb88ace944941943e287a989572bc4ed2ac87dd_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:c4a5f9877fe1aadac666ee57737dc9c06d3281c8296f41ece7d4cbbca35b5760_ppc64le", "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:1f969dd1a416c5a502642e0b6f26b23f6feb08ce882dc0c767332e3e6155fda0_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:d7d044b26a46d497885f9cbe3da2b82793a822709f9b949a628553ecec9c6be9_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:e68013d7277592ed091338ba470c84290b7e5f6fe5f72611d5368ec6759fb9ba_ppc64le", "8Base-RHACM-2.3:rhacm2/grafana-dashboard-loader-rhel8@sha256:719492a71598de1c02b90ece7e0205d29e51e4d1422b578f1ab1de6df2c51f31_ppc64le", "8Base-RHACM-2.3:rhacm2/grafana-dashboard-loader-rhel8@sha256:98a728704ae8914fa30865c432eabdf3bb0079ad36889f7ef267637d8b77ce58_amd64", "8Base-RHACM-2.3:rhacm2/grc-ui-api-rhel8@sha256:b7c7b8188a428be1e3fdcf999a5383ff01ce5f62952b4bce115160109bd535b7_ppc64le", "8Base-RHACM-2.3:rhacm2/grc-ui-api-rhel8@sha256:eb683ca36fbda111a78919ae7c116c1eb25b7381d4bd832677fe7ffa1e8a9ae9_amd64", "8Base-RHACM-2.3:rhacm2/grc-ui-rhel8@sha256:7fff192d63fcec1c7269bd33a930af85b5e8970903b2c9adbafd27c846ede149_amd64", "8Base-RHACM-2.3:rhacm2/grc-ui-rhel8@sha256:c8ab69260af4bb6de5704478f642309c8aa9e2acd54c5b1523403e4ac2e6e3ba_ppc64le", "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:33f309345b50f763a60d4214f8e81ebe247e5e08e5d47123e49027e045153ff4_s390x", "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:7420fe81f62c35e368a6475afb5cb3259122f20d863841432f79783ca3aa98b8_amd64", "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:d837fb83dfca6fcb7313810861539ca5885e3a0f47e924f7dbb979cea63c40be_ppc64le", "8Base-RHACM-2.3:rhacm2/insights-client-rhel8@sha256:6a98f068ff319a152ed9f9219b8d10f1fb2ba51dbf7df816a39ddf1b848544f9_ppc64le", "8Base-RHACM-2.3:rhacm2/insights-client-rhel8@sha256:6c25434471cae697b263c7bc1c0c897169770d3f0781bf22721ec9d1f53ef4bd_amd64", "8Base-RHACM-2.3:rhacm2/insights-metrics-rhel8@sha256:9e652db1d8f54105b06184fb6f6009339dd17330914efd6f236bea8182bbf1a6_amd64", "8Base-RHACM-2.3:rhacm2/insights-metrics-rhel8@sha256:d14c9d35c3cf30a852d3a797527af5a8934ba244be03672f21cd50279fe5224c_ppc64le", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-controller-rhel8@sha256:b69cbdc8fb3b2a96b2a36eeebc81c1d835baf0dfdd915034f75acb2bd1cec265_amd64", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-controller-rhel8@sha256:c5660dcdf2383e3eab04388f7ef304390da4d6c936cd205d1bd6d9106b64750e_ppc64le", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:31186b499dca641bd7f18ed9ba12393e0d7fe5adb0d8f7359ed14611493f0911_amd64", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b941671138970358867ef95af1c9060e0b14b9918304ed228f1af0c64e32b7f_ppc64le", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:ed671a0763bc5a91e570d0124536b26a0e64ca85c3328fc34b00695488789993_s390x", "8Base-RHACM-2.3:rhacm2/kui-web-terminal-rhel8@sha256:8e1d64a7eea72bd0e5ff7b49acef73789caabc73fdf32a7a6a4ea890e01a1432_amd64", "8Base-RHACM-2.3:rhacm2/kui-web-terminal-rhel8@sha256:f0e10c0fd8fd63d63e4bd77737570dddd8411b222c48a768233d3efcd68db540_ppc64le", "8Base-RHACM-2.3:rhacm2/managedcluster-import-controller-rhel8@sha256:07dac07aac995190fa215b35498f71370070a16dc483628c1acbeed8489772e7_amd64", "8Base-RHACM-2.3:rhacm2/managedcluster-import-controller-rhel8@sha256:21637cf2186a93bdbab90daeb0454bf8a100822ec349bed411636d914c702248_ppc64le", "8Base-RHACM-2.3:rhacm2/memcached-rhel8@sha256:34a257ffa28c71140baf1582dff07e021cd332e63c0787dfa3e807f1abbc9cbc_ppc64le", "8Base-RHACM-2.3:rhacm2/memcached-rhel8@sha256:635a1bdca4856fe4274e990ffe1beac888c258f1d463b11e7a0ed8c9d715b467_amd64", "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:2643d16445229c534adabfd0aff3f315369d6cd39f12eef432df0c323a6e9c93_s390x", "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:6349b661ed0a32f147234448493bf9e8b9193b8e286aca85ea419893992d72ae_ppc64le", "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:7cf6fc798ecd6035a7274b1901b71159656c4ac2b8b03595023e57ab656970a4_amd64", "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:9cfaa207ccdfcfe2dacb250502f7a1bfe06c168a0f3d5c2f796922d86295d0bf_amd64", "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:c9a5defd921604b3afd2ebcb81ac565812b2bf49f69365f8b0d5debad355bdae_ppc64le", "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:fc0c2f42b1f5e161b1e8bf02317d5a955faad69626b99c3e2bd14bf25a037641_s390x", "8Base-RHACM-2.3:rhacm2/multicluster-observability-rhel8-operator@sha256:5ba5a496e3d16db90aede1e74cc168fb2f13f665059e0d626a99f8370cfd70de_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-observability-rhel8-operator@sha256:cc125c467c17953a31bfe5845598f3bbf730b0eb078d9e0e8ea627e32d116d1a_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-application-rhel8@sha256:07c40c41d834d71fe6fcc08ef891dfcbcdafa801d8ee26c4a315b3c7d4c71349_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-application-rhel8@sha256:671c02a0d9fb1966238afda0e64affe038f5c32e421ccaa40f0da329a3b6df2b_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-channel-rhel8@sha256:38d8e305fa53afae1c0699bafdddb33472525d9c79e687915ae685de42ef5cc4_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-channel-rhel8@sha256:bc69edc5133bb46357f6b46c25f36653fd42de9740a2cced7aea10e34b2f0cc8_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-deployable-rhel8@sha256:49c70b19e22b140c837ebb6010d8d592dba1855a9cd07bbf33905110f8a962ce_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-deployable-rhel8@sha256:f681193db52645128b8e13bc087ad812b7d803f52421c4447ec4895fd86d948c_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-placementrule-rhel8@sha256:649824f00f658b0614aab89b39332acee06ccdcc023149751f35e92adb5ab945_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-placementrule-rhel8@sha256:b6e66db32fcea05aee763785890e0828b64fd855c0c39b07cfdbdf9567983c2a_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:05192653c6d7f2830e4e146bfa0047488b4dd5d792f9e8b12a6ed10e6009d08c_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:b276453aeba8606b708738a00ae1a8aa637140e350aaed25a512eb908e9a3141_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:8b803d2a406e26190f270372472d4b8a4f8f79e683b1f1ed0c7bc35bf6751f09_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:aff03be35e3de24ab5af37f7f319801c9b7809ac93cabad3c67519c64189897e_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:f318c2560a3493255c739b10ffdb2730d50a9c6d7c77323f82db1a678da7b4c9_s390x", "8Base-RHACM-2.3:rhacm2/multiclusterhub-repo-rhel8@sha256:7303d028baf414e8fc48e5148d8fdd7ee799f0400dbdd8c91fb6c2031ca1485f_ppc64le", "8Base-RHACM-2.3:rhacm2/multiclusterhub-repo-rhel8@sha256:8b37ebb110341edb028da13358a0e25d21a59449b3f359ee3bf1c3f89af54a63_amd64", "8Base-RHACM-2.3:rhacm2/multiclusterhub-rhel8@sha256:63d9d2f2fd2f43d3b16f748a35c55617b4e150b79753ff7a2278060815a3d58c_amd64", "8Base-RHACM-2.3:rhacm2/multiclusterhub-rhel8@sha256:fa1eb816f320fc99d3c6031bcd59edc0e437fdf0d86c48f89c3101aaaff49550_ppc64le", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8-operator@sha256:e4b7d3134aa49a1c93535ab6237eb7efec01bec229499309797772dfa2650910_amd64", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8-operator@sha256:ffcaa9f390631225ddcbe349936193130c148c5c7040ee7a7d61dc94c3193bca_ppc64le", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8@sha256:0d8cf3c46573bc0c9db2f72e18b7692c5d537a8171b6e7a2f0c6416c001fe0b9_ppc64le", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8@sha256:e9854b1d4e1a1c10ae28f560752fc2c8ad239b4c5d0bd8562cb0a8852776b115_amd64", "8Base-RHACM-2.3:rhacm2/openshift-hive-rhel8@sha256:02ea2b7e846d88c228dfbf2af479255fa50ddfd06ed572449fddeba6226a0258_ppc64le", "8Base-RHACM-2.3:rhacm2/openshift-hive-rhel8@sha256:8e8e1a3ddb874b1c8bc801f3da034798072a83c232fa90e3a6e328e382435fe8_amd64", "8Base-RHACM-2.3:rhacm2/placement-rhel8@sha256:013c92ba798deafdb3d66528be5c8a5eebd3512c5a2c31940748b2de410875dc_ppc64le", "8Base-RHACM-2.3:rhacm2/placement-rhel8@sha256:25339dd6aacf9778a75d794d0b12d1058bf6f9e3c7e7ccb998e04f75dec0c824_amd64", "8Base-RHACM-2.3:rhacm2/prometheus-alertmanager-rhel8@sha256:1c9e96a2e4a9e405abc29321e34d7492496f61089d63ccb5ac75967f5985591f_ppc64le", "8Base-RHACM-2.3:rhacm2/prometheus-alertmanager-rhel8@sha256:5041aebd780a81c1089f63d41f5452dce405c1a48cbe9601d4987c2cd0f545db_amd64", "8Base-RHACM-2.3:rhacm2/provider-credential-controller-rhel8@sha256:dd253eac64c3f09ff5b5f445afe9c470e35d99e516affc350eedc9c8ff684ac5_amd64", "8Base-RHACM-2.3:rhacm2/provider-credential-controller-rhel8@sha256:dd3c6ddd835f225e3ccc3414bb7246d39585d2096953edf7b8773fd786c9cb85_ppc64le", "8Base-RHACM-2.3:rhacm2/rbac-query-proxy-rhel8@sha256:34d3ea3226d97490b760c562ea94c26d0e575f715f2e571f93fe07e0b67a70cd_ppc64le", "8Base-RHACM-2.3:rhacm2/rbac-query-proxy-rhel8@sha256:81c96abd6e9d2226cad1a05d90c53b186421e95ce8a2fa19e7751ad60fac111f_amd64", "8Base-RHACM-2.3:rhacm2/redisgraph-tls-rhel8@sha256:794c69bb58199712b9f685e422a97b8f4ba3867670431367f53f77d55d735b9d_amd64", "8Base-RHACM-2.3:rhacm2/redisgraph-tls-rhel8@sha256:a8dfa37c8980b40494101473e7c0f808e04245e34cd2b4fdd6e0f70a713e8d37_ppc64le", "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:37255966c475174d79646e0e2f61c2c5728b925fb6f7931a24572687cc04dd7c_amd64", "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:95949eaaa1588e3c67d580ac91e5baf046074f90497d629f0a0b5cb59ee6605c_ppc64le", "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:ec240366aea9063004433cd702d74cfc16020b478afe8f7070903005aba15461_s390x", "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:1fc0c751515605fb9930fb053d5b596626bf97a818a218bab4a6afe8296ddd12_ppc64le", "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:90125ef36957dd46563547ba92288c1aeabaffca8da1412fbd0c040bd19907a2_amd64", "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:b2b8859e33a00215f916243fccf98d7dcf1e3ed4c341d0b690a1bd919c9c6adc_s390x", "8Base-RHACM-2.3:rhacm2/search-aggregator-rhel8@sha256:6bf94d358b66666064d768e9c3fdf498becb62bd9dd9f1c3f287f5940effd648_ppc64le", "8Base-RHACM-2.3:rhacm2/search-aggregator-rhel8@sha256:cc15ad2f0a4274e6ce649ba96d5a8cfdda08ceb48c23ac764aa28f7a3e06d315_amd64", "8Base-RHACM-2.3:rhacm2/search-api-rhel8@sha256:e5de357f6b3074136b23491b9f4a7ae5445c5f9b376fe2231e49ac7aa6e2daec_amd64", "8Base-RHACM-2.3:rhacm2/search-api-rhel8@sha256:ff0b767f49ad6c5cadd8e41155b3906fa4a64554d5629809bbcefd4a5da52ad0_ppc64le", "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:047c09e212d1c3d24b70c0e78c8c0cbd55c13a3b0f8bc74d0a11debffaf2bdaf_ppc64le", "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:804f7341a1b7159736025aa41041ee04a4cec0a494635a01ffb542845dbe27dc_amd64", "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:9f49b4e0d3d6d993e8ff043fa396bc692ca0f50b5354f422ef45368a2207d9f2_s390x", "8Base-RHACM-2.3:rhacm2/search-rhel8@sha256:1c2adeaacb3eb9eed3fe20cc6c1f83e75498cc754645d26b84bff7c2204599aa_amd64", "8Base-RHACM-2.3:rhacm2/search-rhel8@sha256:3d823a648bd61b0c5b7e7f7ff7b7e6b3ebb3718885aff1b05425ac40cec9fa05_ppc64le", "8Base-RHACM-2.3:rhacm2/search-ui-rhel8@sha256:9773164120f0a5966df9e2a352a6d49a442f00992ed179ad6c14ab99e4c7bff0_amd64", "8Base-RHACM-2.3:rhacm2/search-ui-rhel8@sha256:c0b8e5d43945d0e251fcbb1ee26b9c4c0610de96ef345c4fdd1bc64fae6dd444_ppc64le", "8Base-RHACM-2.3:rhacm2/submariner-addon-rhel8@sha256:8791a21c0396c374e2791a23716f643947bfd742fe56f5483336d29ee57750ca_ppc64le", "8Base-RHACM-2.3:rhacm2/submariner-addon-rhel8@sha256:b5a27b3f7bfb3f3ca65f7b7515de800516b9e73758f77a58dd86839254e3e2b8_amd64", "8Base-RHACM-2.3:rhacm2/thanos-receive-controller-rhel8@sha256:7a78d3a5e5323721ea89fe43e965a2b796c0b340ef5dfe7e4f1d1f8ddfe72a3a_amd64", "8Base-RHACM-2.3:rhacm2/thanos-receive-controller-rhel8@sha256:df4ad638a80c673121997ef8054893cc9d6968e706211df807c31da43aa6c0e6_ppc64le", "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:30db88c9eca70c76e985bec24b138d1f88b9c06d7f43f2280b94d491dc5b245c_s390x", "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:76b83815e514e340417fb5eb1bb82c342734e18813d92ab86dbfe29ff65e084c_amd64", "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:c72c6a08cc557ac85d2690e7e8996db98c70545c64348432780858a90c017610_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T14:25:25+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.3:rhacm2/console-rhel8@sha256:2f090e167fa9bace7e3dbac425921bcdbf415d454de99d868a14226862888945_amd64", "8Base-RHACM-2.3:rhacm2/console-rhel8@sha256:e93a19a6c0db798b328d7d921870dc597a90f3b829ce481b6cae952289da19b0_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6271" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHACM-2.3:rhacm2/management-ingress-rhel7@sha256:b798d8f17236c6a809377d1dbc14e76686919986ed8ea4035629c7dcfeea9a14_ppc64le", "7Server-RHACM-2.3:rhacm2/management-ingress-rhel7@sha256:f5fdd5f3b34c59d7d1eb73a26e056a24ff003825e528535d0acf3f4b205766a2_amd64", "7Server-RHACM-2.3:rhacm2/memcached-exporter-rhel7@sha256:88e14f3bd185d0158ead6bd41f1805320b55ed55a7ab7cb823418bbb075c1fe7_ppc64le", "7Server-RHACM-2.3:rhacm2/memcached-exporter-rhel7@sha256:abe82a77c0b20434fd9e30bb4f50c4be43e407e6eee1f824ecf045a89f113757_amd64", "7Server-RHACM-2.3:rhacm2/thanos-rhel7@sha256:53ad20b1f040d85041657efc95a05f8477386fe1735d7c96e8ba07a05fa9b2be_amd64", "7Server-RHACM-2.3:rhacm2/thanos-rhel7@sha256:7e9c9a46abd9e00b2e77d06583ca2644c21ed64cc89baadc51e00934613fe1a2_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-grafana-rhel8@sha256:5462f1cb074c593dec22d2b32ac23039155598260f5d4ee332c66cfe8195f207_amd64", "8Base-RHACM-2.3:rhacm2/acm-grafana-rhel8@sha256:9725c9180f597eb6615404f672ffeecd04f639cfd3c6097d91bb6ff636efb0d2_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-must-gather-rhel8@sha256:800f487f71b2d65361af1b86bdd054643718321098cbecf0789717105394a6af_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-must-gather-rhel8@sha256:cafbda0901580bb72a2613d15ee658927da0f7bfa5ea1423332c5de95e698041_amd64", "8Base-RHACM-2.3:rhacm2/acm-operator-bundle@sha256:a45e23fdcfa02c1841152e352f58aea50c359ff442d3d3896e9ae0280996ba99_ppc64le", "8Base-RHACM-2.3:rhacm2/acm-operator-bundle@sha256:c66c1d55806626b477bb32bff202b6b75089e98099400975fc99b1e3db4e69b1_amd64", "8Base-RHACM-2.3:rhacm2/agent-service-rhel8@sha256:489d60ec5e6eda1b49c7a480e0f0e586a0b274d07df48d624e48b69b85f31e16_amd64", "8Base-RHACM-2.3:rhacm2/agent-service-rhel8@sha256:9e13b8a4610b11815be84028bf7de9355f75402699d6f1b6cbb4a98cbaacfe41_ppc64le", "8Base-RHACM-2.3:rhacm2/application-ui-rhel8@sha256:3224179c171ba87c58ad417a94443fcea0b0619aa8f4b970825cad44e534a347_ppc64le", "8Base-RHACM-2.3:rhacm2/application-ui-rhel8@sha256:cb8936e165acd1b9072da825c783a81ca6823da3b79391e386716904b8c982bc_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-agent-rhel8@sha256:7299da84e5dc26da48a7ee9780b01c1642ab7b930fa3722ee170c1a78d3a0afa_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-reporter-rhel8@sha256:2e96d4022f3f0270f197c75881ba8c168961652ccc60f58a014cddb9cfb2e497_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-reporter-rhel8@sha256:9675875122b5001393ef4e6a6ac7bafdee592c8c9bc91fcd0a71acd57e3750bb_ppc64le", "8Base-RHACM-2.3:rhacm2/assisted-installer-rhel8@sha256:dd4d3e2948ab564b21a5aaa5a0242feed99b70cfde44a7bddcfa4b2173609602_amd64", "8Base-RHACM-2.3:rhacm2/assisted-installer-rhel8@sha256:f501f4bc0a9e3acd86eca2c05d1b6dae90e03d060015a94c32ce31f903372d5c_ppc64le", "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:549deeeb6f619a12e2162f40aa17e67c9f3e3492970ca1bba4509d6176a9fb54_amd64", "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:6b53a0c151a6fc5b066eb0c4afe057b653ff76227b9c223a3eafb74157454d2d_s390x", "8Base-RHACM-2.3:rhacm2/cert-policy-controller-rhel8@sha256:6d1fe4fad43f7f1321f87ed456716f41bb1b24eb00fd66f9758152b566b168c6_ppc64le", "8Base-RHACM-2.3:rhacm2/cluster-curator-controller-rhel8@sha256:bb88a0bf65a8b938bd0ebdbebdae79be60f0ecc4f4a69025e2ffee17154dda6e_ppc64le", "8Base-RHACM-2.3:rhacm2/cluster-curator-controller-rhel8@sha256:d6a147d1a02f4c702b25a3d5b92fed131e94f7d34227f33c6910e255a4c61127_amd64", "8Base-RHACM-2.3:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e3057346b858ce63922b46f8bcbca952cf83e66db24ab1f137a8fb1378795a8_ppc64le", "8Base-RHACM-2.3:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:9c52a4d57bb174e8b4c2fb6793ac94b087e0cc6cb24ea1480052ce430369370e_amd64", "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:7da556098e5e536a92792062f18798d8b4b4c5e43d961eaa545b4360d8a74492_amd64", "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:a51a956bbac51ae096d32a373bfbcc520e8926be3608e05744b04ccf1e33f71e_s390x", "8Base-RHACM-2.3:rhacm2/config-policy-controller-rhel8@sha256:c5772c181334a58c44dff660be5feede0b08f6bfce5e5ab9bc59117db40e10ef_ppc64le", "8Base-RHACM-2.3:rhacm2/console-api-rhel8@sha256:03099e106fe591e230f5ff47a90ce9e475575b4cd32f16fdd230e70c65128e77_ppc64le", "8Base-RHACM-2.3:rhacm2/console-api-rhel8@sha256:534dd3df29b0a59a766a1e0ac6e0d04376d9dfbfbf4bece508f147b60a8bc9fd_amd64", "8Base-RHACM-2.3:rhacm2/console-rhel8@sha256:2f090e167fa9bace7e3dbac425921bcdbf415d454de99d868a14226862888945_amd64", "8Base-RHACM-2.3:rhacm2/console-rhel8@sha256:e93a19a6c0db798b328d7d921870dc597a90f3b829ce481b6cae952289da19b0_ppc64le", "8Base-RHACM-2.3:rhacm2/discovery-rhel8-operator@sha256:219c952dcb29b569ccb1d318a73cd08d0c5f55e20000b4a852f5454b18dd8aa5_ppc64le", "8Base-RHACM-2.3:rhacm2/discovery-rhel8-operator@sha256:a8683ec8eddb7509155b8935b19e4ec33a6fa5870ae0126e8d885e5dfbb2221a_amd64", "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:3e6b3b09fe10fff48cd4de7e4de95d68c460e51019f25f4523339e0eda028eec_ppc64le", "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:8a223c90fd554a36c8ec26c463ca895568364f550b2921f13e3498a4f0dee636_amd64", "8Base-RHACM-2.3:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c852e42dd5193ad1c7d056c9b635f29a791c4a16b43459a61196fc532f64a810_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-propagator-rhel8@sha256:da1bb14e382749fb72f08c23366df733e5804229ce8265fa8029d18eb6ad10b9_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-propagator-rhel8@sha256:f4f6a958f47633afc47cb92349e9fdf653b052a4f84106f3f06ff590071e47f5_ppc64le", "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:2c96db8365c173bb434222da23b7ea536e6d48cbfc59b8ea5da7191d81116188_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:987f8b16c73bbdb4633118aaf88df560bced0f98e958a6b0359789adecc17274_ppc64le", "8Base-RHACM-2.3:rhacm2/governance-policy-spec-sync-rhel8@sha256:ca3e6dbf9e8859fa4ca2562feccc457989a761143e849dafcefad7128c046ac0_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:694b1ec5af7c84d439a3a9a6ccf6f6c1325cdcd6d726107c2d533f8bb4e0a659_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:9703e634221ffcc6bb43e7757eb88ace944941943e287a989572bc4ed2ac87dd_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-status-sync-rhel8@sha256:c4a5f9877fe1aadac666ee57737dc9c06d3281c8296f41ece7d4cbbca35b5760_ppc64le", "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:1f969dd1a416c5a502642e0b6f26b23f6feb08ce882dc0c767332e3e6155fda0_amd64", "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:d7d044b26a46d497885f9cbe3da2b82793a822709f9b949a628553ecec9c6be9_s390x", "8Base-RHACM-2.3:rhacm2/governance-policy-template-sync-rhel8@sha256:e68013d7277592ed091338ba470c84290b7e5f6fe5f72611d5368ec6759fb9ba_ppc64le", "8Base-RHACM-2.3:rhacm2/grafana-dashboard-loader-rhel8@sha256:719492a71598de1c02b90ece7e0205d29e51e4d1422b578f1ab1de6df2c51f31_ppc64le", "8Base-RHACM-2.3:rhacm2/grafana-dashboard-loader-rhel8@sha256:98a728704ae8914fa30865c432eabdf3bb0079ad36889f7ef267637d8b77ce58_amd64", "8Base-RHACM-2.3:rhacm2/grc-ui-api-rhel8@sha256:b7c7b8188a428be1e3fdcf999a5383ff01ce5f62952b4bce115160109bd535b7_ppc64le", "8Base-RHACM-2.3:rhacm2/grc-ui-api-rhel8@sha256:eb683ca36fbda111a78919ae7c116c1eb25b7381d4bd832677fe7ffa1e8a9ae9_amd64", "8Base-RHACM-2.3:rhacm2/grc-ui-rhel8@sha256:7fff192d63fcec1c7269bd33a930af85b5e8970903b2c9adbafd27c846ede149_amd64", "8Base-RHACM-2.3:rhacm2/grc-ui-rhel8@sha256:c8ab69260af4bb6de5704478f642309c8aa9e2acd54c5b1523403e4ac2e6e3ba_ppc64le", "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:33f309345b50f763a60d4214f8e81ebe247e5e08e5d47123e49027e045153ff4_s390x", "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:7420fe81f62c35e368a6475afb5cb3259122f20d863841432f79783ca3aa98b8_amd64", "8Base-RHACM-2.3:rhacm2/iam-policy-controller-rhel8@sha256:d837fb83dfca6fcb7313810861539ca5885e3a0f47e924f7dbb979cea63c40be_ppc64le", "8Base-RHACM-2.3:rhacm2/insights-client-rhel8@sha256:6a98f068ff319a152ed9f9219b8d10f1fb2ba51dbf7df816a39ddf1b848544f9_ppc64le", "8Base-RHACM-2.3:rhacm2/insights-client-rhel8@sha256:6c25434471cae697b263c7bc1c0c897169770d3f0781bf22721ec9d1f53ef4bd_amd64", "8Base-RHACM-2.3:rhacm2/insights-metrics-rhel8@sha256:9e652db1d8f54105b06184fb6f6009339dd17330914efd6f236bea8182bbf1a6_amd64", "8Base-RHACM-2.3:rhacm2/insights-metrics-rhel8@sha256:d14c9d35c3cf30a852d3a797527af5a8934ba244be03672f21cd50279fe5224c_ppc64le", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-controller-rhel8@sha256:b69cbdc8fb3b2a96b2a36eeebc81c1d835baf0dfdd915034f75acb2bd1cec265_amd64", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-controller-rhel8@sha256:c5660dcdf2383e3eab04388f7ef304390da4d6c936cd205d1bd6d9106b64750e_ppc64le", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:31186b499dca641bd7f18ed9ba12393e0d7fe5adb0d8f7359ed14611493f0911_amd64", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:3b941671138970358867ef95af1c9060e0b14b9918304ed228f1af0c64e32b7f_ppc64le", "8Base-RHACM-2.3:rhacm2/klusterlet-addon-rhel8-operator@sha256:ed671a0763bc5a91e570d0124536b26a0e64ca85c3328fc34b00695488789993_s390x", "8Base-RHACM-2.3:rhacm2/kui-web-terminal-rhel8@sha256:8e1d64a7eea72bd0e5ff7b49acef73789caabc73fdf32a7a6a4ea890e01a1432_amd64", "8Base-RHACM-2.3:rhacm2/kui-web-terminal-rhel8@sha256:f0e10c0fd8fd63d63e4bd77737570dddd8411b222c48a768233d3efcd68db540_ppc64le", "8Base-RHACM-2.3:rhacm2/managedcluster-import-controller-rhel8@sha256:07dac07aac995190fa215b35498f71370070a16dc483628c1acbeed8489772e7_amd64", "8Base-RHACM-2.3:rhacm2/managedcluster-import-controller-rhel8@sha256:21637cf2186a93bdbab90daeb0454bf8a100822ec349bed411636d914c702248_ppc64le", "8Base-RHACM-2.3:rhacm2/memcached-rhel8@sha256:34a257ffa28c71140baf1582dff07e021cd332e63c0787dfa3e807f1abbc9cbc_ppc64le", "8Base-RHACM-2.3:rhacm2/memcached-rhel8@sha256:635a1bdca4856fe4274e990ffe1beac888c258f1d463b11e7a0ed8c9d715b467_amd64", "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:2643d16445229c534adabfd0aff3f315369d6cd39f12eef432df0c323a6e9c93_s390x", "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:6349b661ed0a32f147234448493bf9e8b9193b8e286aca85ea419893992d72ae_ppc64le", "8Base-RHACM-2.3:rhacm2/metrics-collector-rhel8@sha256:7cf6fc798ecd6035a7274b1901b71159656c4ac2b8b03595023e57ab656970a4_amd64", "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:9cfaa207ccdfcfe2dacb250502f7a1bfe06c168a0f3d5c2f796922d86295d0bf_amd64", "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:c9a5defd921604b3afd2ebcb81ac565812b2bf49f69365f8b0d5debad355bdae_ppc64le", "8Base-RHACM-2.3:rhacm2/multicloud-manager-rhel8@sha256:fc0c2f42b1f5e161b1e8bf02317d5a955faad69626b99c3e2bd14bf25a037641_s390x", "8Base-RHACM-2.3:rhacm2/multicluster-observability-rhel8-operator@sha256:5ba5a496e3d16db90aede1e74cc168fb2f13f665059e0d626a99f8370cfd70de_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-observability-rhel8-operator@sha256:cc125c467c17953a31bfe5845598f3bbf730b0eb078d9e0e8ea627e32d116d1a_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-application-rhel8@sha256:07c40c41d834d71fe6fcc08ef891dfcbcdafa801d8ee26c4a315b3c7d4c71349_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-application-rhel8@sha256:671c02a0d9fb1966238afda0e64affe038f5c32e421ccaa40f0da329a3b6df2b_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-channel-rhel8@sha256:38d8e305fa53afae1c0699bafdddb33472525d9c79e687915ae685de42ef5cc4_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-channel-rhel8@sha256:bc69edc5133bb46357f6b46c25f36653fd42de9740a2cced7aea10e34b2f0cc8_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-deployable-rhel8@sha256:49c70b19e22b140c837ebb6010d8d592dba1855a9cd07bbf33905110f8a962ce_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-deployable-rhel8@sha256:f681193db52645128b8e13bc087ad812b7d803f52421c4447ec4895fd86d948c_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-placementrule-rhel8@sha256:649824f00f658b0614aab89b39332acee06ccdcc023149751f35e92adb5ab945_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-placementrule-rhel8@sha256:b6e66db32fcea05aee763785890e0828b64fd855c0c39b07cfdbdf9567983c2a_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:05192653c6d7f2830e4e146bfa0047488b4dd5d792f9e8b12a6ed10e6009d08c_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:b276453aeba8606b708738a00ae1a8aa637140e350aaed25a512eb908e9a3141_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:8b803d2a406e26190f270372472d4b8a4f8f79e683b1f1ed0c7bc35bf6751f09_ppc64le", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:aff03be35e3de24ab5af37f7f319801c9b7809ac93cabad3c67519c64189897e_amd64", "8Base-RHACM-2.3:rhacm2/multicluster-operators-subscription-rhel8@sha256:f318c2560a3493255c739b10ffdb2730d50a9c6d7c77323f82db1a678da7b4c9_s390x", "8Base-RHACM-2.3:rhacm2/multiclusterhub-repo-rhel8@sha256:7303d028baf414e8fc48e5148d8fdd7ee799f0400dbdd8c91fb6c2031ca1485f_ppc64le", "8Base-RHACM-2.3:rhacm2/multiclusterhub-repo-rhel8@sha256:8b37ebb110341edb028da13358a0e25d21a59449b3f359ee3bf1c3f89af54a63_amd64", "8Base-RHACM-2.3:rhacm2/multiclusterhub-rhel8@sha256:63d9d2f2fd2f43d3b16f748a35c55617b4e150b79753ff7a2278060815a3d58c_amd64", "8Base-RHACM-2.3:rhacm2/multiclusterhub-rhel8@sha256:fa1eb816f320fc99d3c6031bcd59edc0e437fdf0d86c48f89c3101aaaff49550_ppc64le", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8-operator@sha256:e4b7d3134aa49a1c93535ab6237eb7efec01bec229499309797772dfa2650910_amd64", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8-operator@sha256:ffcaa9f390631225ddcbe349936193130c148c5c7040ee7a7d61dc94c3193bca_ppc64le", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8@sha256:0d8cf3c46573bc0c9db2f72e18b7692c5d537a8171b6e7a2f0c6416c001fe0b9_ppc64le", "8Base-RHACM-2.3:rhacm2/observatorium-rhel8@sha256:e9854b1d4e1a1c10ae28f560752fc2c8ad239b4c5d0bd8562cb0a8852776b115_amd64", "8Base-RHACM-2.3:rhacm2/openshift-hive-rhel8@sha256:02ea2b7e846d88c228dfbf2af479255fa50ddfd06ed572449fddeba6226a0258_ppc64le", "8Base-RHACM-2.3:rhacm2/openshift-hive-rhel8@sha256:8e8e1a3ddb874b1c8bc801f3da034798072a83c232fa90e3a6e328e382435fe8_amd64", "8Base-RHACM-2.3:rhacm2/placement-rhel8@sha256:013c92ba798deafdb3d66528be5c8a5eebd3512c5a2c31940748b2de410875dc_ppc64le", "8Base-RHACM-2.3:rhacm2/placement-rhel8@sha256:25339dd6aacf9778a75d794d0b12d1058bf6f9e3c7e7ccb998e04f75dec0c824_amd64", "8Base-RHACM-2.3:rhacm2/prometheus-alertmanager-rhel8@sha256:1c9e96a2e4a9e405abc29321e34d7492496f61089d63ccb5ac75967f5985591f_ppc64le", "8Base-RHACM-2.3:rhacm2/prometheus-alertmanager-rhel8@sha256:5041aebd780a81c1089f63d41f5452dce405c1a48cbe9601d4987c2cd0f545db_amd64", "8Base-RHACM-2.3:rhacm2/provider-credential-controller-rhel8@sha256:dd253eac64c3f09ff5b5f445afe9c470e35d99e516affc350eedc9c8ff684ac5_amd64", "8Base-RHACM-2.3:rhacm2/provider-credential-controller-rhel8@sha256:dd3c6ddd835f225e3ccc3414bb7246d39585d2096953edf7b8773fd786c9cb85_ppc64le", "8Base-RHACM-2.3:rhacm2/rbac-query-proxy-rhel8@sha256:34d3ea3226d97490b760c562ea94c26d0e575f715f2e571f93fe07e0b67a70cd_ppc64le", "8Base-RHACM-2.3:rhacm2/rbac-query-proxy-rhel8@sha256:81c96abd6e9d2226cad1a05d90c53b186421e95ce8a2fa19e7751ad60fac111f_amd64", "8Base-RHACM-2.3:rhacm2/redisgraph-tls-rhel8@sha256:794c69bb58199712b9f685e422a97b8f4ba3867670431367f53f77d55d735b9d_amd64", "8Base-RHACM-2.3:rhacm2/redisgraph-tls-rhel8@sha256:a8dfa37c8980b40494101473e7c0f808e04245e34cd2b4fdd6e0f70a713e8d37_ppc64le", "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:37255966c475174d79646e0e2f61c2c5728b925fb6f7931a24572687cc04dd7c_amd64", "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:95949eaaa1588e3c67d580ac91e5baf046074f90497d629f0a0b5cb59ee6605c_ppc64le", "8Base-RHACM-2.3:rhacm2/registration-rhel8-operator@sha256:ec240366aea9063004433cd702d74cfc16020b478afe8f7070903005aba15461_s390x", "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:1fc0c751515605fb9930fb053d5b596626bf97a818a218bab4a6afe8296ddd12_ppc64le", "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:90125ef36957dd46563547ba92288c1aeabaffca8da1412fbd0c040bd19907a2_amd64", "8Base-RHACM-2.3:rhacm2/registration-rhel8@sha256:b2b8859e33a00215f916243fccf98d7dcf1e3ed4c341d0b690a1bd919c9c6adc_s390x", "8Base-RHACM-2.3:rhacm2/search-aggregator-rhel8@sha256:6bf94d358b66666064d768e9c3fdf498becb62bd9dd9f1c3f287f5940effd648_ppc64le", "8Base-RHACM-2.3:rhacm2/search-aggregator-rhel8@sha256:cc15ad2f0a4274e6ce649ba96d5a8cfdda08ceb48c23ac764aa28f7a3e06d315_amd64", "8Base-RHACM-2.3:rhacm2/search-api-rhel8@sha256:e5de357f6b3074136b23491b9f4a7ae5445c5f9b376fe2231e49ac7aa6e2daec_amd64", "8Base-RHACM-2.3:rhacm2/search-api-rhel8@sha256:ff0b767f49ad6c5cadd8e41155b3906fa4a64554d5629809bbcefd4a5da52ad0_ppc64le", "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:047c09e212d1c3d24b70c0e78c8c0cbd55c13a3b0f8bc74d0a11debffaf2bdaf_ppc64le", "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:804f7341a1b7159736025aa41041ee04a4cec0a494635a01ffb542845dbe27dc_amd64", "8Base-RHACM-2.3:rhacm2/search-collector-rhel8@sha256:9f49b4e0d3d6d993e8ff043fa396bc692ca0f50b5354f422ef45368a2207d9f2_s390x", "8Base-RHACM-2.3:rhacm2/search-rhel8@sha256:1c2adeaacb3eb9eed3fe20cc6c1f83e75498cc754645d26b84bff7c2204599aa_amd64", "8Base-RHACM-2.3:rhacm2/search-rhel8@sha256:3d823a648bd61b0c5b7e7f7ff7b7e6b3ebb3718885aff1b05425ac40cec9fa05_ppc64le", "8Base-RHACM-2.3:rhacm2/search-ui-rhel8@sha256:9773164120f0a5966df9e2a352a6d49a442f00992ed179ad6c14ab99e4c7bff0_amd64", "8Base-RHACM-2.3:rhacm2/search-ui-rhel8@sha256:c0b8e5d43945d0e251fcbb1ee26b9c4c0610de96ef345c4fdd1bc64fae6dd444_ppc64le", "8Base-RHACM-2.3:rhacm2/submariner-addon-rhel8@sha256:8791a21c0396c374e2791a23716f643947bfd742fe56f5483336d29ee57750ca_ppc64le", "8Base-RHACM-2.3:rhacm2/submariner-addon-rhel8@sha256:b5a27b3f7bfb3f3ca65f7b7515de800516b9e73758f77a58dd86839254e3e2b8_amd64", "8Base-RHACM-2.3:rhacm2/thanos-receive-controller-rhel8@sha256:7a78d3a5e5323721ea89fe43e965a2b796c0b340ef5dfe7e4f1d1f8ddfe72a3a_amd64", "8Base-RHACM-2.3:rhacm2/thanos-receive-controller-rhel8@sha256:df4ad638a80c673121997ef8054893cc9d6968e706211df807c31da43aa6c0e6_ppc64le", "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:30db88c9eca70c76e985bec24b138d1f88b9c06d7f43f2280b94d491dc5b245c_s390x", "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:76b83815e514e340417fb5eb1bb82c342734e18813d92ab86dbfe29ff65e084c_amd64", "8Base-RHACM-2.3:rhacm2/work-rhel8@sha256:c72c6a08cc557ac85d2690e7e8996db98c70545c64348432780858a90c017610_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
WID-SEC-W-2023-0137
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0137 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0137.json" }, { "category": "self", "summary": "WID-SEC-2023-0137 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0137" }, { "category": "external", "summary": "Hitachi Software Vulnerability Information hitachi-sec-2023-117 vom 2023-05-23", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-117/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 6963077 vom 2023-03-13", "url": "https://www.ibm.com/support/pages/node/6963077" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2023 - Appendix Oracle Communications vom 2023-01-17", "url": "https://www.oracle.com/security-alerts/cpujan2023.html#AppendixCGBU" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-22T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:10:37.081+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0137", "initial_release_date": "2023-01-17T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-03-13T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-05-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HITACHI aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Security Guardium 11.3", "product": { "name": "IBM Security Guardium 11.3", "product_id": "1048943", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.3" } } }, { "category": "product_name", "name": "IBM Security Guardium 11.5", "product": { "name": "IBM Security Guardium 11.5", "product_id": "T026399", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.5" } } } ], "category": "product_name", "name": "Security Guardium" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Communications 1.11.0", "product": { "name": "Oracle Communications 1.11.0", "product_id": "T020684", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:1.11.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.1.0", "product": { "name": "Oracle Communications 22.1.0", "product_id": "T022812", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.2.0", "product": { "name": "Oracle Communications 22.2.0", "product_id": "T023908", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.1.1", "product": { "name": "Oracle Communications 22.1.1", "product_id": "T023910", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.1" } } }, { "category": "product_name", "name": "Oracle Communications 22.2.1", "product": { "name": "Oracle Communications 22.2.1", "product_id": "T024969", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.1" } } }, { "category": "product_name", "name": "Oracle Communications 8.6.0.0", "product": { "name": "Oracle Communications 8.6.0.0", "product_id": "T024970", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.6.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.0", "product": { "name": "Oracle Communications 22.3.0", "product_id": "T024974", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.2.2", "product": { "name": "Oracle Communications 22.2.2", "product_id": "T024978", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.2" } } }, { "category": "product_name", "name": "Oracle Communications 22.2.3", "product": { "name": "Oracle Communications 22.2.3", "product_id": "T024979", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.3" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.1", "product": { "name": "Oracle Communications 22.3.1", "product_id": "T024980", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.1" } } }, { "category": "product_name", "name": "Oracle Communications \u003c= 22.4.0", "product": { "name": "Oracle Communications \u003c= 22.4.0", "product_id": "T024981", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.4.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.3", "product": { "name": "Oracle Communications 22.3.3", "product_id": "T025862", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.3" } } }, { "category": "product_name", "name": "Oracle Communications 22.1.0.0.0", "product": { "name": "Oracle Communications 22.1.0.0.0", "product_id": "T025863", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.0.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.2.4", "product": { "name": "Oracle Communications 22.2.4", "product_id": "T025864", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.4" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.2", "product": { "name": "Oracle Communications 22.3.2", "product_id": "T025865", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.2" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.4", "product": { "name": "Oracle Communications 22.3.4", "product_id": "T025866", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.4" } } }, { "category": "product_name", "name": "Oracle Communications 7.1.0", "product": { "name": "Oracle Communications 7.1.0", "product_id": "T025867", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:7.1.0" } } }, { "category": "product_name", "name": "Oracle Communications 8.0.0", "product": { "name": "Oracle Communications 8.0.0", "product_id": "T025868", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.4.1", "product": { "name": "Oracle Communications 22.4.1", "product_id": "T025869", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.4.1" } } }, { "category": "product_name", "name": "Oracle Communications 22.0.0.0.0", "product": { "name": "Oracle Communications 22.0.0.0.0", "product_id": "T025870", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.0.0.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 8.2.3.0", "product": { "name": "Oracle Communications 8.2.3.0", "product_id": "T025871", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.2.3.0" } } }, { "category": "product_name", "name": "Oracle Communications 10.4.0.4.1", "product": { "name": "Oracle Communications 10.4.0.4.1", "product_id": "T025872", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:10.4.0.4.1" } } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1273", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2018-1273" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2021-40528", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2021-40528" }, { "cve": "CVE-2022-0084", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-0084" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0934", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-0934" }, { "cve": "CVE-2022-1304", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1319", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-1319" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-2053", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-2053" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2509", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-2509" }, { "cve": "CVE-2022-2526", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-2526" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-27404", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-27404" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-30293", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-30293" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-31629", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-31629" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-34305", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-34305" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-4147", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-4147" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-43403", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-43403" }, { "cve": "CVE-2023-21890", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2023-21890" } ] }
wid-sec-w-2022-1476
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "SUSE Manager basiert auf Spacewalk, welche die Codebase vom Red Hat\r\nSatellite Server nutzt und erm\u00f6glicht ein zentrale Systemmanagement von Linux-Umgebungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen in SUSE Manager ausnutzen, um Sicherheitsvorkehrungen zu umgehen, beliebigen Code auszuf\u00fchren, seine Privilegien zu erweitern und einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1476 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1476.json" }, { "category": "self", "summary": "WID-SEC-2022-1476 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1476" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0593-1 vom 2023-03-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/013958.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012289.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012286.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012291.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3761-1 vom 2022-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012707.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3750-1 vom 2022-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" } ], "source_lang": "en-US", "title": "SUSE Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-03-02T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:58:46.451+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1476", "initial_release_date": "2022-09-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-03-02T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE Manager \u003c 4.2.9", "product": { "name": "SUSE Manager \u003c 4.2.9", "product_id": "T024662", "product_identification_helper": { "cpe": "cpe:/a:suse:manager:4.2.9" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41411", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in SUSE Manager. Der Fehler besteht in der Komponente drools aufgrund einer XML External Entity (XXE) Schwachstelle in KieModuleMarshaller.java. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T002207" ] }, "release_date": "2022-09-19T22:00:00Z", "title": "CVE-2021-41411" }, { "cve": "CVE-2021-42740", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in SUSE Manager. Der Fehler besteht in der Komponente Node.js aufgrund einer Befehlsinjektion. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er durch eine Regex, die f\u00fcr die Unterst\u00fctzung von Windows-Laufwerksbuchstaben entwickelt wurde, uneingescapte Shell-Metazeichen einf\u00fcgt, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207" ] }, "release_date": "2022-09-19T22:00:00Z", "title": "CVE-2021-42740" }, { "cve": "CVE-2021-43138", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in SUSE Manager. Der Fehler besteht in der Komponente Async in der mapValues()-Methode aufgrund einer Prototypenverschmutzung. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T002207" ] }, "release_date": "2022-09-19T22:00:00Z", "title": "CVE-2021-43138" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in SUSE Manager. Der Fehler besteht in der Komponente Moment aufgrund eines ineffizienten Parsing-Algorithmus. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er Eingaben mit mehr als 10k Zeichen \u00fcbermittelt, um einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207" ] }, "release_date": "2022-09-19T22:00:00Z", "title": "CVE-2022-31129" } ] }
wid-sec-w-2023-1489
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren und einen Denial of Service Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1489 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1489.json" }, { "category": "self", "summary": "WID-SEC-2023-1489 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1489" }, { "category": "external", "summary": "RHSA-2023:3623 - Security Advisory vom 2023-06-15", "url": "https://access.redhat.com/errata/RHSA-2023:3623" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-15T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:31:37.760+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1489", "initial_release_date": "2023-06-15T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Ceph Storage 6.1", "product": { "name": "Red Hat Enterprise Linux Ceph Storage 6.1", "product_id": "T028158", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:ceph_storage_6.1" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux Ceph Storage. Der Fehler besteht im Moment.js-Paket bei der \u00dcbergabe von vom Benutzer bereitgestellten Zeichenketten ohne \u00dcberpr\u00fcfung der korrekten L\u00e4nge an den Moment-Konstruktor. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T028158" ] }, "release_date": "2023-06-15T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2021-4231", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux Ceph Storage existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden im angular/core Paket nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, authentisierter Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T028158" ] }, "release_date": "2023-06-15T22:00:00Z", "title": "CVE-2021-4231" } ] }
wid-sec-w-2024-0528
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Data Protection Advisor ist eine Monitoring L\u00f6sung. Der Collector ist der lokale Agent.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell Data Protection Advisor ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Berechtigungen zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0528 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0528.json" }, { "category": "self", "summary": "WID-SEC-2024-0528 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0528" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-107 vom 2024-02-29", "url": "https://www.dell.com/support/kbdoc/000222618/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell Data Protection Advisor: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-29T23:00:00.000+00:00", "generator": { "date": "2024-03-01T12:07:07.687+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0528", "initial_release_date": "2024-02-29T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-29T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 19.10", "product": { "name": "Dell Data Protection Advisor \u003c 19.10", "product_id": "T033198", "product_identification_helper": { "cpe": "cpe:/a:dell:data_protection_advisor:19.10" } } } ], "category": "product_name", "name": "Data Protection Advisor" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45648", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-45648" }, { "cve": "CVE-2023-42795", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-42795" }, { "cve": "CVE-2023-41080", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-41080" }, { "cve": "CVE-2023-34055", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-34055" }, { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-28154", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-28154" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-22067", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-22067" }, { "cve": "CVE-2023-22025", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-22025" }, { "cve": "CVE-2023-20883", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-20883" }, { "cve": "CVE-2023-20873", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-20873" }, { "cve": "CVE-2023-20863", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-20863" }, { "cve": "CVE-2023-20861", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-20861" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-27772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-27772" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-25858", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-25858" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-22968", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-22968" }, { "cve": "CVE-2022-22965", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-22965" }, { "cve": "CVE-2022-22950", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-22950" }, { "cve": "CVE-2021-43980", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2021-43980" }, { "cve": "CVE-2021-33037", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2021-33037" }, { "cve": "CVE-2021-30640", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2021-30640" }, { "cve": "CVE-2020-5421", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-5421" }, { "cve": "CVE-2020-1938", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-1938" }, { "cve": "CVE-2020-1935", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-1935" }, { "cve": "CVE-2020-13943", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-13943" }, { "cve": "CVE-2020-13935", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-13935" }, { "cve": "CVE-2020-13934", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-13934" }, { "cve": "CVE-2020-11996", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-11996" }, { "cve": "CVE-2019-2684", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-2684" }, { "cve": "CVE-2019-17563", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-17563" }, { "cve": "CVE-2019-12418", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-12418" }, { "cve": "CVE-2019-10072", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-10072" }, { "cve": "CVE-2019-0232", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-0232" }, { "cve": "CVE-2019-0221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-0221" }, { "cve": "CVE-2019-0199", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-0199" }, { "cve": "CVE-2018-8037", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-8037" }, { "cve": "CVE-2018-8034", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-8034" }, { "cve": "CVE-2018-8014", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-8014" }, { "cve": "CVE-2018-15756", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-15756" }, { "cve": "CVE-2018-1336", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1336" }, { "cve": "CVE-2018-1305", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1305" }, { "cve": "CVE-2018-1304", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1304" }, { "cve": "CVE-2018-1275", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1275" }, { "cve": "CVE-2018-1272", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1272" }, { "cve": "CVE-2018-1271", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1271" }, { "cve": "CVE-2018-1270", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1270" }, { "cve": "CVE-2018-1257", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1257" }, { "cve": "CVE-2018-1199", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1199" }, { "cve": "CVE-2018-1196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1196" }, { "cve": "CVE-2018-11784", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-11784" }, { "cve": "CVE-2018-11040", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-11040" }, { "cve": "CVE-2018-11039", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-11039" }, { "cve": "CVE-2017-8046", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-8046" }, { "cve": "CVE-2017-7675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-7675" }, { "cve": "CVE-2017-7674", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-7674" }, { "cve": "CVE-2017-5664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-5664" }, { "cve": "CVE-2017-5651", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-5651" }, { "cve": "CVE-2017-5650", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-5650" }, { "cve": "CVE-2017-5648", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-5648" }, { "cve": "CVE-2017-5647", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-5647" }, { "cve": "CVE-2017-18640", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-18640" }, { "cve": "CVE-2017-12617", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-12617" }, { "cve": "CVE-2016-9878", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2016-9878" }, { "cve": "CVE-2016-8745", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2016-8745" }, { "cve": "CVE-2016-8735", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2016-8735" }, { "cve": "CVE-2016-6817", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2016-6817" }, { "cve": "CVE-2016-6816", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2016-6816" } ] }
WID-SEC-W-2022-1776
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "MySQL ist ein Open Source Datenbankserver von Oracle.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1776 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1776.json" }, { "category": "self", "summary": "WID-SEC-2022-1776 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1776" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - October 2022 - Appendix Oracle MySQL vom 2022-10-18", "url": "https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5696-1 vom 2022-10-24", "url": "https://www.cybersecurity-help.cz/vdb/SB2022102425" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5696-1 vom 2022-10-24", "url": "https://ubuntu.com/security/notices/USN-5696-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5696-2 vom 2022-10-26", "url": "https://ubuntu.com/security/notices/USN-5696-2" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20221028-0013 vom 2022-10-28", "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-40 vom 2022-10-31", "url": "https://security.gentoo.org/glsa/202210-40" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3307-2 vom 2022-11-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012802.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5712-1 vom 2022-11-07", "url": "https://ubuntu.com/security/notices/USN-5716-1" }, { "category": "external", "summary": "IBM Security Bulletin 6838215 vom 2022-11-10", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-hsqldb-2-0-0-jar-shipped-with-ibm-tivoli-business-service-manager-is-vulnerable-to-remote-code-execution-cve-2022-41853/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0110 vom 2023-01-12", "url": "https://access.redhat.com/errata/RHSA-2023:0110" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-0110 vom 2023-01-12", "url": "http://linux.oracle.com/errata/ELSA-2023-0110.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-1911 vom 2023-01-23", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1911.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0339 vom 2023-01-23", "url": "https://access.redhat.com/errata/RHSA-2023:0339" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0631-1 vom 2023-03-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/013977.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1102 vom 2023-03-07", "url": "https://access.redhat.com/errata/RHSA-2023:1102" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2621 vom 2023-05-09", "url": "https://access.redhat.com/errata/RHSA-2023:2621" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3087 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:3087" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-2621 vom 2023-05-18", "url": "https://oss.oracle.com/pipermail/el-errata/2023-May/013976.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-3087 vom 2023-05-25", "url": "https://linux.oracle.com/errata/ELSA-2023-3087.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0425 vom 2024-01-25", "url": "https://access.redhat.com/errata/RHSA-2024:0425" } ], "source_lang": "en-US", "title": "Oracle MySQL: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-25T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:01:08.496+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1776", "initial_release_date": "2022-10-18T22:00:00.000+00:00", "revision_history": [ { "date": "2022-10-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-24T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-10-30T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2022-10-31T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-11-02T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-11-07T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-11-09T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-01-12T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-01-23T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon und Red Hat aufgenommen" }, { "date": "2023-02-07T23:00:00.000+00:00", "number": "12", "summary": "Referenz(en) aufgenommen: FEDORA-2023-D332F0B6A3" }, { "date": "2023-03-06T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-03-07T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-09T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-16T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-05-25T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "19" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "IBM Tivoli Business Service Manager", "product": { "name": "IBM Tivoli Business Service Manager", "product_id": "5175", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_business_service_manager:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T016960", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "branches": [ { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.27", "product": { "name": "Oracle MySQL \u003c= 8.0.27", "product_id": "1120145", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.27" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 5.7.36", "product": { "name": "Oracle MySQL \u003c= 5.7.36", "product_id": "1120160", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:5.7.36" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.28", "product": { "name": "Oracle MySQL \u003c= 8.0.28", "product_id": "1163192", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.28" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 4.1.4", "product": { "name": "Oracle MySQL \u003c= 4.1.4", "product_id": "424408", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:4.1.4" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.16", "product": { "name": "Oracle MySQL \u003c= 8.0.16", "product_id": "424657", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.16" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.29", "product": { "name": "Oracle MySQL \u003c= 8.0.29", "product_id": "T022871", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.29" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.30", "product": { "name": "Oracle MySQL \u003c= 8.0.30", "product_id": "T023949", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.30" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.31", "product": { "name": "Oracle MySQL \u003c= 8.0.31", "product_id": "T025005", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.31" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 5.7.39", "product": { "name": "Oracle MySQL \u003c= 5.7.39", "product_id": "T025006", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:5.7.39" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 1.6.3", "product": { "name": "Oracle MySQL \u003c= 1.6.3", "product_id": "T025007", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:1.6.3" } } } ], "category": "product_name", "name": "MySQL" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21589", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21589" }, { "cve": "CVE-2022-21592", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21592" }, { "cve": "CVE-2022-21594", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21594" }, { "cve": "CVE-2022-21595", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21595" }, { "cve": "CVE-2022-21599", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21599" }, { "cve": "CVE-2022-21600", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21600" }, { "cve": "CVE-2022-21604", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21604" }, { "cve": "CVE-2022-21605", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21605" }, { "cve": "CVE-2022-21607", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21607" }, { "cve": "CVE-2022-21608", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21608" }, { "cve": "CVE-2022-21611", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21611" }, { "cve": "CVE-2022-21617", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21617" }, { "cve": "CVE-2022-21625", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21625" }, { "cve": "CVE-2022-21632", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21632" }, { "cve": "CVE-2022-21633", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21633" }, { "cve": "CVE-2022-21635", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21635" }, { "cve": "CVE-2022-21637", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21637" }, { "cve": "CVE-2022-21638", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21638" }, { "cve": "CVE-2022-21640", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21640" }, { "cve": "CVE-2022-21641", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21641" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-34305", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-34305" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-39400", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39400" }, { "cve": "CVE-2022-39402", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39402" }, { "cve": "CVE-2022-39403", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39403" }, { "cve": "CVE-2022-39404", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39404" }, { "cve": "CVE-2022-39408", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39408" }, { "cve": "CVE-2022-39410", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39410" } ] }
WID-SEC-W-2023-1489
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren und einen Denial of Service Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1489 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1489.json" }, { "category": "self", "summary": "WID-SEC-2023-1489 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1489" }, { "category": "external", "summary": "RHSA-2023:3623 - Security Advisory vom 2023-06-15", "url": "https://access.redhat.com/errata/RHSA-2023:3623" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-15T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:31:37.760+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1489", "initial_release_date": "2023-06-15T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Ceph Storage 6.1", "product": { "name": "Red Hat Enterprise Linux Ceph Storage 6.1", "product_id": "T028158", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:ceph_storage_6.1" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux Ceph Storage. Der Fehler besteht im Moment.js-Paket bei der \u00dcbergabe von vom Benutzer bereitgestellten Zeichenketten ohne \u00dcberpr\u00fcfung der korrekten L\u00e4nge an den Moment-Konstruktor. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T028158" ] }, "release_date": "2023-06-15T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2021-4231", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux Ceph Storage existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden im angular/core Paket nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, authentisierter Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T028158" ] }, "release_date": "2023-06-15T22:00:00Z", "title": "CVE-2021-4231" } ] }
WID-SEC-W-2023-1808
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1808 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1808.json" }, { "category": "self", "summary": "WID-SEC-2023-1808 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1808" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2023 - Appendix Oracle Financial Services Applications vom 2023-07-18", "url": "https://www.oracle.com/security-alerts/cpujul2023.html#AppendixIFLX" } ], "source_lang": "en-US", "title": "Oracle Financial Services Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-07-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:37:20.126+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1808", "initial_release_date": "2023-07-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-07-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0", "product": { "name": "Oracle Financial Services Applications 8.1.0", "product_id": "T018983", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 14.3", "product": { "name": "Oracle Financial Services Applications \u003c= 14.3", "product_id": "T019887", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.3" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1", "product_id": "T019891", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7", "product": { "name": "Oracle Financial Services Applications 8.0.7", "product_id": "T021676", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8", "product": { "name": "Oracle Financial Services Applications 8.0.8", "product_id": "T021677", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1", "product_id": "T022835", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.1", "product_id": "T022844", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2", "product": { "name": "Oracle Financial Services Applications 8.0.8.2", "product_id": "T024990", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 14.7", "product": { "name": "Oracle Financial Services Applications \u003c= 14.7", "product_id": "T027348", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.4", "product": { "name": "Oracle Financial Services Applications 8.1.2.4", "product_id": "T027351", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.6", "product": { "name": "Oracle Financial Services Applications 14.6", "product_id": "T027355", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.6" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 18.2.0.0.0", "product": { "name": "Oracle Financial Services Applications 18.2.0.0.0", "product_id": "T028691", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:18.2.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 18.3.0.0.0", "product": { "name": "Oracle Financial Services Applications 18.3.0.0.0", "product_id": "T028692", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:18.3.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.1.0.0.0", "product": { "name": "Oracle Financial Services Applications 19.1.0.0.0", "product_id": "T028693", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.1.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.2.0.0.0", "product": { "name": "Oracle Financial Services Applications 19.2.0.0.0", "product_id": "T028694", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.2.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 21.1.0.0.0", "product": { "name": "Oracle Financial Services Applications 21.1.0.0.0", "product_id": "T028695", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:21.1.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.1.0.0.0", "product": { "name": "Oracle Financial Services Applications 22.1.0.0.0", "product_id": "T028696", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.1.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.2.0.0.0", "product": { "name": "Oracle Financial Services Applications 22.2.0.0.0", "product_id": "T028697", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.2.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0.2.0", "product": { "name": "Oracle Financial Services Applications 14.7.0.2.0", "product_id": "T028698", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.1.0.0", "product": { "name": "Oracle Financial Services Applications 14.7.1.0.0", "product_id": "T028699", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.1.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.5.0.8.0", "product": { "name": "Oracle Financial Services Applications 14.5.0.8.0", "product_id": "T028700", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.5.0.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.6.0.4.0", "product": { "name": "Oracle Financial Services Applications 14.6.0.4.0", "product_id": "T028701", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.6.0.4.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0.0.0", "product": { "name": "Oracle Financial Services Applications 14.7.0.0.0", "product_id": "T028702", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.6.0.3.0", "product": { "name": "Oracle Financial Services Applications 14.6.0.3.0", "product_id": "T028703", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.6.0.3.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0.1.0", "product": { "name": "Oracle Financial Services Applications 14.7.0.1.0", "product_id": "T028704", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2", "product": { "name": "Oracle Financial Services Applications 8.1.2", "product_id": "T028705", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.5", "product": { "name": "Oracle Financial Services Applications 8.1.2.5", "product_id": "T028706", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.5" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0", "product": { "name": "Oracle Financial Services Applications 14.7.0", "product_id": "T028707", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0" } } } ], "category": "product_name", "name": "Financial Services Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-28439", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-28439" }, { "cve": "CVE-2023-25194", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-25194" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-20863", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-20863" }, { "cve": "CVE-2023-20861", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-20861" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2022-48285", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-48285" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-45693", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-45693" }, { "cve": "CVE-2022-45199", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-45199" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-45047", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-45047" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-33879", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-33879" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2020-13936", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2020-13936" } ] }
WID-SEC-W-2023-1021
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1021 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1021.json" }, { "category": "self", "summary": "WID-SEC-2023-1021 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1021" }, { "category": "external", "summary": "IBM Security Bulletin 7008449 vom 2023-06-29", "url": "https://www.ibm.com/support/pages/node/7008449" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2023 - Appendix Oracle Communications vom 2023-04-18", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixCGBU" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-29T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:24:42.911+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1021", "initial_release_date": "2023-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM DB2", "product": { "name": "IBM DB2", "product_id": "5104", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Communications 9.1", "product": { "name": "Oracle Communications 9.1", "product_id": "T019868", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1" } } }, { "category": "product_name", "name": "Oracle Communications 3.3", "product": { "name": "Oracle Communications 3.3", "product_id": "T020687", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:3.3" } } }, { "category": "product_name", "name": "Oracle Communications 5.0", "product": { "name": "Oracle Communications 5.0", "product_id": "T021645", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.0" } } }, { "category": "product_name", "name": "Oracle Communications 12.6.0.0.0", "product": { "name": "Oracle Communications 12.6.0.0.0", "product_id": "T022818", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.6.0.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 7.0.0.0.0", "product": { "name": "Oracle Communications 7.0.0.0.0", "product_id": "T022823", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:7.0.0.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 8.6.0.0", "product": { "name": "Oracle Communications 8.6.0.0", "product_id": "T024970", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.6.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.0", "product": { "name": "Oracle Communications 22.3.0", "product_id": "T024974", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.1.0.0.0", "product": { "name": "Oracle Communications 22.1.0.0.0", "product_id": "T025863", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.0.0.0" } } }, { "category": "product_name", "name": "Oracle Communications \u003c= 22.4.4", "product": { "name": "Oracle Communications \u003c= 22.4.4", "product_id": "T027328", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.4.4" } } }, { "category": "product_name", "name": "Oracle Communications \u003c= 23.1.1", "product": { "name": "Oracle Communications \u003c= 23.1.1", "product_id": "T027329", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.1.1" } } }, { "category": "product_name", "name": "Oracle Communications 9.0.0", "product": { "name": "Oracle Communications 9.0.0", "product_id": "T027330", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 9.0.1", "product": { "name": "Oracle Communications 9.0.1", "product_id": "T027331", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.1" } } }, { "category": "product_name", "name": "Oracle Communications 9.1.1.4.0", "product": { "name": "Oracle Communications 9.1.1.4.0", "product_id": "T027332", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.1.4.0" } } }, { "category": "product_name", "name": "Oracle Communications 9.1.1.3.0", "product": { "name": "Oracle Communications 9.1.1.3.0", "product_id": "T027333", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.1.3.0" } } }, { "category": "product_name", "name": "Oracle Communications 9.0.1.6.0", "product": { "name": "Oracle Communications 9.0.1.6.0", "product_id": "T027334", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.1.6.0" } } }, { "category": "product_name", "name": "Oracle Communications 8.45", "product": { "name": "Oracle Communications 8.45", "product_id": "T027335", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.45" } } }, { "category": "product_name", "name": "Oracle Communications 9.15", "product": { "name": "Oracle Communications 9.15", "product_id": "T027336", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.15" } } }, { "category": "product_name", "name": "Oracle Communications 4.0", "product": { "name": "Oracle Communications 4.0", "product_id": "T027337", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.0" } } }, { "category": "product_name", "name": "Oracle Communications 12.6.1.0.0", "product": { "name": "Oracle Communications 12.6.1.0.0", "product_id": "T027338", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.6.1.0.0" } } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25613", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-25613" }, { "cve": "CVE-2023-25577", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-25577" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-23931", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-23931" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-0361", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-0361" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-45047", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-45047" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-43402", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-43402" }, { "cve": "CVE-2022-43401", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-43401" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-31630", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-31630" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-31123", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-31123" }, { "cve": "CVE-2022-28199", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-28199" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2021-37519", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-37519" } ] }
wid-sec-w-2022-0944
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat OpenShift Service Mesh ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0944 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0944.json" }, { "category": "self", "summary": "WID-SEC-2022-0944 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0944" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1486 vom 2023-03-28", "url": "https://access.redhat.com/errata/RHSA-2023:1486" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0593-1 vom 2023-03-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/013958.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1049 vom 2023-03-02", "url": "https://access.redhat.com/errata/RHSA-2023:1049" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1044 vom 2023-03-02", "url": "https://access.redhat.com/errata/RHSA-2023:1044" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1045 vom 2023-03-02", "url": "https://access.redhat.com/errata/RHSA-2023:1045" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1047 vom 2023-03-02", "url": "https://access.redhat.com/errata/RHSA-2023:1047" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1043 vom 2023-03-02", "url": "https://access.redhat.com/errata/RHSA-2023:1043" }, { "category": "external", "summary": "RedHat Security Advisory vom 2022-08-08", "url": "https://access.redhat.com/errata/RHSA-2022:5913" }, { "category": "external", "summary": "RedHat Security Advisory vom 2022-08-08", "url": "https://access.redhat.com/errata/RHSA-2022:5914" }, { "category": "external", "summary": "RedHat Security Advisory vom 2022-08-08", "url": "https://access.redhat.com/errata/RHSA-2022:5915" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5559-1 vom 2022-08-10", "url": "https://ubuntu.com/security/notices/USN-5559-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6156 vom 2022-08-24", "url": "https://access.redhat.com/errata/RHSA-2022:6156" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6271 vom 2022-08-31", "url": "https://access.redhat.com/errata/RHSA-2022:6271" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6272 vom 2022-08-31", "url": "https://access.redhat.com/errata/RHSA-2022:6272" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6277 vom 2022-09-01", "url": "https://access.redhat.com/errata/RHSA-2022:6277" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6345 vom 2022-09-06", "url": "https://access.redhat.com/errata/RHSA-2022:6345" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6370 vom 2022-09-07", "url": "https://access.redhat.com/errata/RHSA-2022:6370" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6393 vom 2022-09-08", "url": "https://access.redhat.com/errata/RHSA-2022:6393" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6392 vom 2022-09-08", "url": "https://access.redhat.com/errata/RHSA-2022:6392" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6422 vom 2022-09-13", "url": "https://access.redhat.com/errata/RHSA-2022:6422" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6507 vom 2022-09-14", "url": "https://access.redhat.com/errata/RHSA-2022:6507" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6696 vom 2022-09-26", "url": "https://access.redhat.com/errata/RHSA-2022:6696" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6813 vom 2022-10-05", "url": "https://access.redhat.com/errata/RHSA-2022:6813" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6835 vom 2022-10-06", "url": "https://access.redhat.com/errata/RHSA-2022:6835" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-20 vom 2022-10-26", "url": "https://www.tenable.com/security/tns-2022-20" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7276 vom 2022-11-02", "url": "https://access.redhat.com/errata/RHSA-2022:7276" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7313 vom 2022-11-02", "url": "https://access.redhat.com/errata/RHSA-2022:7313" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8652 vom 2022-11-28", "url": "https://access.redhat.com/errata/RHSA-2022:8652" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-28 vom 2022-12-19", "url": "https://www.tenable.com/security/tns-2022-28" } ], "source_lang": "en-US", "title": "Red Hat OpenShift Service Mesh: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2023-03-27T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:54:57.936+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0944", "initial_release_date": "2022-08-08T22:00:00.000+00:00", "revision_history": [ { "date": "2022-08-08T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-08-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-24T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-08-31T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-06T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-08T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-12T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-13T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-26T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-05T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-06T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2022-11-01T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-02T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-28T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2023-03-01T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-03-02T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-03-27T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "19" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 2.0", "product": { "name": "Red Hat OpenShift Service Mesh 2.0", "product_id": "T019393", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh_2.0" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 2.1", "product": { "name": "Red Hat OpenShift Service Mesh 2.1", "product_id": "T024194", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh_2.1" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 2.2", "product": { "name": "Red Hat OpenShift Service Mesh 2.2", "product_id": "T024195", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh_2.2" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Tenable Security Nessus \u003c 10.3.1", "product": { "name": "Tenable Security Nessus \u003c 10.3.1", "product_id": "T025130", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:10.3.1" } } }, { "category": "product_name", "name": "Tenable Security Nessus Network Monitor \u003c 6.2.0", "product": { "name": "Tenable Security Nessus Network Monitor \u003c 6.2.0", "product_id": "T025651", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:6.2.0" } } } ], "category": "vendor", "name": "Tenable Security" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Kiali for OpenShift Service Mesh Containers. Die Ursache dieses Problems ist eine ungen\u00fcgende \u00dcberpr\u00fcfung bereitgestellter Zeichenketten im Moment.js-Paket. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T024195", "T025130", "T024194", "T002207", "67646", "T000126", "T019393", "T025651" ] }, "release_date": "2022-08-08T22:00:00Z", "title": "CVE-2022-31129" } ] }
wid-sec-w-2023-1350
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise in diversen Komponenten von Drittanbietern ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1350 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1350.json" }, { "category": "self", "summary": "WID-SEC-2023-1350 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1350" }, { "category": "external", "summary": "Splunk Enterprise Security Advisory SVD-2023-0613 vom 2023-06-01", "url": "https://advisory.splunk.com/advisories/SVD-2023-0613" }, { "category": "external", "summary": "IBM Security Bulletin 7008449 vom 2023-06-29", "url": "https://www.ibm.com/support/pages/node/7008449" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0487-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017931.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0486-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017932.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen in Komponenten von Drittanbietern", "tracking": { "current_release_date": "2024-02-15T23:00:00.000+00:00", "generator": { "date": "2024-02-16T09:06:57.360+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1350", "initial_release_date": "2023-06-01T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-01T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-02-15T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM DB2", "product": { "name": "IBM DB2", "product_id": "5104", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 8.1.14", "product": { "name": "Splunk Splunk Enterprise \u003c 8.1.14", "product_id": "T027935", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.1.14" } } }, { "category": "product_version_range", "name": "\u003c 8.2.11", "product": { "name": "Splunk Splunk Enterprise \u003c 8.2.11", "product_id": "T027936", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.11" } } }, { "category": "product_version_range", "name": "\u003c 9.0.5", "product": { "name": "Splunk Splunk Enterprise \u003c 9.0.5", "product_id": "T027937", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.5" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-4200", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-4200" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-37616", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37616" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-25858", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-25858" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-33587", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33587" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33502", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33502" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-27292", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-27292" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-23368", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23368" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-20095", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-20095" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8203", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8203" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8116", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8116" }, { "cve": "CVE-2020-7774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7774" }, { "cve": "CVE-2020-7753", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7753" }, { "cve": "CVE-2020-7662", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7662" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-15138", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-15138" }, { "cve": "CVE-2020-13822", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-13822" }, { "cve": "CVE-2019-20149", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-20149" }, { "cve": "CVE-2019-10746", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-10746" }, { "cve": "CVE-2019-10744", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-10744" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2017-16042", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2017-16042" } ] }
wid-sec-w-2022-1776
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "MySQL ist ein Open Source Datenbankserver von Oracle.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1776 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1776.json" }, { "category": "self", "summary": "WID-SEC-2022-1776 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1776" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - October 2022 - Appendix Oracle MySQL vom 2022-10-18", "url": "https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5696-1 vom 2022-10-24", "url": "https://www.cybersecurity-help.cz/vdb/SB2022102425" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5696-1 vom 2022-10-24", "url": "https://ubuntu.com/security/notices/USN-5696-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5696-2 vom 2022-10-26", "url": "https://ubuntu.com/security/notices/USN-5696-2" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20221028-0013 vom 2022-10-28", "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-40 vom 2022-10-31", "url": "https://security.gentoo.org/glsa/202210-40" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3307-2 vom 2022-11-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012802.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5712-1 vom 2022-11-07", "url": "https://ubuntu.com/security/notices/USN-5716-1" }, { "category": "external", "summary": "IBM Security Bulletin 6838215 vom 2022-11-10", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-hsqldb-2-0-0-jar-shipped-with-ibm-tivoli-business-service-manager-is-vulnerable-to-remote-code-execution-cve-2022-41853/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0110 vom 2023-01-12", "url": "https://access.redhat.com/errata/RHSA-2023:0110" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-0110 vom 2023-01-12", "url": "http://linux.oracle.com/errata/ELSA-2023-0110.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-1911 vom 2023-01-23", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1911.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0339 vom 2023-01-23", "url": "https://access.redhat.com/errata/RHSA-2023:0339" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0631-1 vom 2023-03-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/013977.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1102 vom 2023-03-07", "url": "https://access.redhat.com/errata/RHSA-2023:1102" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2621 vom 2023-05-09", "url": "https://access.redhat.com/errata/RHSA-2023:2621" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3087 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:3087" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-2621 vom 2023-05-18", "url": "https://oss.oracle.com/pipermail/el-errata/2023-May/013976.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-3087 vom 2023-05-25", "url": "https://linux.oracle.com/errata/ELSA-2023-3087.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0425 vom 2024-01-25", "url": "https://access.redhat.com/errata/RHSA-2024:0425" } ], "source_lang": "en-US", "title": "Oracle MySQL: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-25T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:01:08.496+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1776", "initial_release_date": "2022-10-18T22:00:00.000+00:00", "revision_history": [ { "date": "2022-10-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-24T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-10-30T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2022-10-31T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-11-02T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-11-07T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-11-09T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-01-12T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-01-23T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon und Red Hat aufgenommen" }, { "date": "2023-02-07T23:00:00.000+00:00", "number": "12", "summary": "Referenz(en) aufgenommen: FEDORA-2023-D332F0B6A3" }, { "date": "2023-03-06T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-03-07T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-09T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-16T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-05-25T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "19" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "IBM Tivoli Business Service Manager", "product": { "name": "IBM Tivoli Business Service Manager", "product_id": "5175", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_business_service_manager:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T016960", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "branches": [ { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.27", "product": { "name": "Oracle MySQL \u003c= 8.0.27", "product_id": "1120145", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.27" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 5.7.36", "product": { "name": "Oracle MySQL \u003c= 5.7.36", "product_id": "1120160", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:5.7.36" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.28", "product": { "name": "Oracle MySQL \u003c= 8.0.28", "product_id": "1163192", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.28" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 4.1.4", "product": { "name": "Oracle MySQL \u003c= 4.1.4", "product_id": "424408", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:4.1.4" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.16", "product": { "name": "Oracle MySQL \u003c= 8.0.16", "product_id": "424657", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.16" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.29", "product": { "name": "Oracle MySQL \u003c= 8.0.29", "product_id": "T022871", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.29" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.30", "product": { "name": "Oracle MySQL \u003c= 8.0.30", "product_id": "T023949", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.30" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 8.0.31", "product": { "name": "Oracle MySQL \u003c= 8.0.31", "product_id": "T025005", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.31" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 5.7.39", "product": { "name": "Oracle MySQL \u003c= 5.7.39", "product_id": "T025006", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:5.7.39" } } }, { "category": "product_name", "name": "Oracle MySQL \u003c= 1.6.3", "product": { "name": "Oracle MySQL \u003c= 1.6.3", "product_id": "T025007", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:1.6.3" } } } ], "category": "product_name", "name": "MySQL" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21589", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21589" }, { "cve": "CVE-2022-21592", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21592" }, { "cve": "CVE-2022-21594", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21594" }, { "cve": "CVE-2022-21595", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21595" }, { "cve": "CVE-2022-21599", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21599" }, { "cve": "CVE-2022-21600", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21600" }, { "cve": "CVE-2022-21604", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21604" }, { "cve": "CVE-2022-21605", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21605" }, { "cve": "CVE-2022-21607", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21607" }, { "cve": "CVE-2022-21608", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21608" }, { "cve": "CVE-2022-21611", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21611" }, { "cve": "CVE-2022-21617", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21617" }, { "cve": "CVE-2022-21625", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21625" }, { "cve": "CVE-2022-21632", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21632" }, { "cve": "CVE-2022-21633", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21633" }, { "cve": "CVE-2022-21635", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21635" }, { "cve": "CVE-2022-21637", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21637" }, { "cve": "CVE-2022-21638", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21638" }, { "cve": "CVE-2022-21640", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21640" }, { "cve": "CVE-2022-21641", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-21641" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-34305", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-34305" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-39400", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39400" }, { "cve": "CVE-2022-39402", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39402" }, { "cve": "CVE-2022-39403", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39403" }, { "cve": "CVE-2022-39404", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39404" }, { "cve": "CVE-2022-39408", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39408" }, { "cve": "CVE-2022-39410", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer, authentisierter oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion oder erweiterte Rechte notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "5175", "T002207", "67646", "T000126", "398363", "T012167", "T004914", "T016960" ], "last_affected": [ "1120145", "1163192", "424408", "T025007", "424657", "1120160", "T022871", "T025006", "T025005", "T023949" ] }, "release_date": "2022-10-18T22:00:00Z", "title": "CVE-2022-39410" } ] }
wid-sec-w-2023-2684
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Utilities Applications ist eine Produktfamilie mit branchenspezifischen L\u00f6sungen f\u00fcr Ver- und Entsorger.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Utilities Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2684 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2684.json" }, { "category": "self", "summary": "WID-SEC-2023-2684 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2684" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - October 2023 - Appendix Oracle Utilities Applications vom 2023-10-17", "url": "https://www.oracle.com/security-alerts/cpuoct2023.html#AppendixUTIL" } ], "source_lang": "en-US", "title": "Oracle Utilities Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-17T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:48:16.886+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2684", "initial_release_date": "2023-10-17T22:00:00.000+00:00", "revision_history": [ { "date": "2023-10-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Utilities Applications 4.2.0.3.0", "product": { "name": "Oracle Utilities Applications 4.2.0.3.0", "product_id": "T030619", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.2.0.3.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications \u003c= 4.3.0.6.0", "product": { "name": "Oracle Utilities Applications \u003c= 4.3.0.6.0", "product_id": "T030620", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.3.0.6.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.4.0.0.0", "product": { "name": "Oracle Utilities Applications 4.4.0.0.0", "product_id": "T030621", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.4.0.0.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.4.0.2.0", "product": { "name": "Oracle Utilities Applications 4.4.0.2.0", "product_id": "T030622", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.4.0.2.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.3.0.5.0", "product": { "name": "Oracle Utilities Applications 4.3.0.5.0", "product_id": "T030623", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.3.0.5.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.4.0.3.0", "product": { "name": "Oracle Utilities Applications 4.4.0.3.0", "product_id": "T030625", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.4.0.3.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.5.0.0.0", "product": { "name": "Oracle Utilities Applications 4.5.0.0.0", "product_id": "T030626", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.5.0.0.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.5.0.0.1", "product": { "name": "Oracle Utilities Applications 4.5.0.0.1", "product_id": "T030627", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.5.0.0.1" } } }, { "category": "product_name", "name": "Oracle Utilities Applications \u003c= 4.5.0.1.2", "product": { "name": "Oracle Utilities Applications \u003c= 4.5.0.1.2", "product_id": "T030628", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.5.0.1.2" } } } ], "category": "product_name", "name": "Utilities Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21829", "notes": [ { "category": "description", "text": "In Oracle Utilities Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T030622", "T030621", "T030623", "T030626", "T030625", "T030627", "T030619" ], "last_affected": [ "T030620", "T030628" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2023-21829" }, { "cve": "CVE-2022-42920", "notes": [ { "category": "description", "text": "In Oracle Utilities Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T030622", "T030621", "T030623", "T030626", "T030625", "T030627", "T030619" ], "last_affected": [ "T030620", "T030628" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2022-42920" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle Utilities Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T030622", "T030621", "T030623", "T030626", "T030625", "T030627", "T030619" ], "last_affected": [ "T030620", "T030628" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2022-31129" } ] }
wid-sec-w-2023-1808
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1808 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1808.json" }, { "category": "self", "summary": "WID-SEC-2023-1808 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1808" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2023 - Appendix Oracle Financial Services Applications vom 2023-07-18", "url": "https://www.oracle.com/security-alerts/cpujul2023.html#AppendixIFLX" } ], "source_lang": "en-US", "title": "Oracle Financial Services Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-07-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:37:20.126+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1808", "initial_release_date": "2023-07-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-07-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0", "product": { "name": "Oracle Financial Services Applications 8.1.0", "product_id": "T018983", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 14.3", "product": { "name": "Oracle Financial Services Applications \u003c= 14.3", "product_id": "T019887", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.3" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1", "product_id": "T019891", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7", "product": { "name": "Oracle Financial Services Applications 8.0.7", "product_id": "T021676", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8", "product": { "name": "Oracle Financial Services Applications 8.0.8", "product_id": "T021677", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1", "product_id": "T022835", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.1", "product_id": "T022844", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2", "product": { "name": "Oracle Financial Services Applications 8.0.8.2", "product_id": "T024990", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 14.7", "product": { "name": "Oracle Financial Services Applications \u003c= 14.7", "product_id": "T027348", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.4", "product": { "name": "Oracle Financial Services Applications 8.1.2.4", "product_id": "T027351", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.6", "product": { "name": "Oracle Financial Services Applications 14.6", "product_id": "T027355", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.6" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 18.2.0.0.0", "product": { "name": "Oracle Financial Services Applications 18.2.0.0.0", "product_id": "T028691", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:18.2.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 18.3.0.0.0", "product": { "name": "Oracle Financial Services Applications 18.3.0.0.0", "product_id": "T028692", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:18.3.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.1.0.0.0", "product": { "name": "Oracle Financial Services Applications 19.1.0.0.0", "product_id": "T028693", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.1.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.2.0.0.0", "product": { "name": "Oracle Financial Services Applications 19.2.0.0.0", "product_id": "T028694", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.2.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 21.1.0.0.0", "product": { "name": "Oracle Financial Services Applications 21.1.0.0.0", "product_id": "T028695", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:21.1.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.1.0.0.0", "product": { "name": "Oracle Financial Services Applications 22.1.0.0.0", "product_id": "T028696", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.1.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.2.0.0.0", "product": { "name": "Oracle Financial Services Applications 22.2.0.0.0", "product_id": "T028697", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.2.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0.2.0", "product": { "name": "Oracle Financial Services Applications 14.7.0.2.0", "product_id": "T028698", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.1.0.0", "product": { "name": "Oracle Financial Services Applications 14.7.1.0.0", "product_id": "T028699", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.1.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.5.0.8.0", "product": { "name": "Oracle Financial Services Applications 14.5.0.8.0", "product_id": "T028700", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.5.0.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.6.0.4.0", "product": { "name": "Oracle Financial Services Applications 14.6.0.4.0", "product_id": "T028701", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.6.0.4.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0.0.0", "product": { "name": "Oracle Financial Services Applications 14.7.0.0.0", "product_id": "T028702", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.6.0.3.0", "product": { "name": "Oracle Financial Services Applications 14.6.0.3.0", "product_id": "T028703", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.6.0.3.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0.1.0", "product": { "name": "Oracle Financial Services Applications 14.7.0.1.0", "product_id": "T028704", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2", "product": { "name": "Oracle Financial Services Applications 8.1.2", "product_id": "T028705", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.5", "product": { "name": "Oracle Financial Services Applications 8.1.2.5", "product_id": "T028706", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.5" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0", "product": { "name": "Oracle Financial Services Applications 14.7.0", "product_id": "T028707", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0" } } } ], "category": "product_name", "name": "Financial Services Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-28439", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-28439" }, { "cve": "CVE-2023-25194", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-25194" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-20863", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-20863" }, { "cve": "CVE-2023-20861", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-20861" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2022-48285", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-48285" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-45693", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-45693" }, { "cve": "CVE-2022-45199", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-45199" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-45047", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-45047" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-33879", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-33879" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2020-13936", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T019891", "T021677", "T022844", "T018983", "T021676", "T028707", "T028705", "T028706", "T028703", "T028704", "T028701", "T028702", "T028700", "T027355", "T028693", "T028694", "T028691", "T028692", "T022835", "T028699", "T028697", "T028698", "T028695", "T024990", "T028696" ], "last_affected": [ "T019887", "T027348" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2020-13936" } ] }
wid-sec-w-2023-1542
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1542 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1542.json" }, { "category": "self", "summary": "WID-SEC-2023-1542 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1542" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0139 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0139" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0143 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0143" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0137 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0137" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0121" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14", "url": "https://access.redhat.com/errata/RHSA-2023:7820" }, { "category": "external", "summary": "Meinberg Security Advisory", "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2024-01-lantime-firmware-v7-08-007.htm" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3742 vom 2023-06-22", "url": "https://access.redhat.com/errata/RHSA-2023:3742" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3612 vom 2023-06-23", "url": "https://access.redhat.com/errata/RHSA-2023:3614" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3615 vom 2023-06-22", "url": "https://access.redhat.com/errata/RHSA-2023:3615" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27", "url": "https://access.redhat.com/errata/RHSA-2023:3613" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2023-06-29", "url": "https://access.redhat.com/errata/RHSA-2023:3918" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3943 vom 2023-06-29", "url": "https://access.redhat.com/errata/RHSA-2023:3943" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3910 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3910" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3915 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3915" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3925 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3925" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4003 vom 2023-07-10", "url": "https://access.redhat.com/errata/RHSA-2023:4003" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-6CFE7492C1 vom 2023-07-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6cfe7492c1" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-AA7C75ED4A vom 2023-07-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-aa7c75ed4a" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4025 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4025" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4112 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4112" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4113 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4113" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4114 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4114" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4053" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4204 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4204" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4090 vom 2023-07-21", "url": "https://access.redhat.com/errata/RHSA-2023:4090" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4241 vom 2023-07-21", "url": "https://access.redhat.com/errata/RHSA-2023:4241" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4238 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4238" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4093 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4093" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4091 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4091" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4225 vom 2023-07-27", "url": "https://access.redhat.com/errata/RHSA-2023:4225" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4226 vom 2023-07-27", "url": "https://access.redhat.com/errata/RHSA-2023:4226" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4470 vom 2023-08-03", "url": "https://access.redhat.com/errata/RHSA-2023:4470" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4335 vom 2023-08-08", "url": "https://access.redhat.com/errata/RHSA-2023:4335" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4674 vom 2023-08-23", "url": "https://access.redhat.com/errata/RHSA-2023:4674" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4983 vom 2023-09-05", "url": "https://access.redhat.com/errata/RHSA-2023:4983" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5103 vom 2023-09-12", "url": "https://access.redhat.com/errata/RHSA-2023:5103" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5233 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5233" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5314 vom 2023-09-20", "url": "https://access.redhat.com/errata/RHSA-2023:5314" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30", "url": "https://access.redhat.com/errata/RHSA-2023:5006" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6316 vom 2023-11-07", "url": "https://access.redhat.com/errata/RHSA-2023:6316" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7058 vom 2023-11-15", "url": "https://access.redhat.com/errata/RHSA-2023:7058" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7823 vom 2024-01-05", "url": "https://access.redhat.com/errata/RHSA-2023:7823" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6939 vom 2023-11-21", "url": "https://linux.oracle.com/errata/ELSA-2023-6939.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-14A33318B8 vom 2023-12-03", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-14a33318b8" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7672 vom 2023-12-06", "url": "https://access.redhat.com/errata/RHSA-2023:7672" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-04 vom 2024-05-04", "url": "https://security.gentoo.org/glsa/202405-04" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2987" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3254 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3254" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T12:11:49.378+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1542", "initial_release_date": "2023-06-22T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-22T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-25T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-26T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-28T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-05T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-10T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-20T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-26T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-03T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-23T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-05T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-12T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-19T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-20T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-07T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-14T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-21T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-12-03T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2023-12-06T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-13T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-01T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-04T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-10T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Meinberg aufgenommen" }, { "date": "2024-05-05T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "32" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.08.007", "product": { "name": "Meinberg LANTIME \u003c7.08.007", "product_id": "T032435", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:7.08.007" } } } ], "category": "product_name", "name": "LANTIME" } ], "category": "vendor", "name": "Meinberg" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "Advanced Cluster Security for Kubernetes 4", "product": { "name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4", "product_id": "T027916", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4" } } }, { "category": "product_version", "name": "Service Interconnect 1", "product": { "name": "Red Hat Enterprise Linux Service Interconnect 1", "product_id": "T028472", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T008027", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } }, { "category": "product_version", "name": "Container Platform 4.12", "product": { "name": "Red Hat OpenShift Container Platform 4.12", "product_id": "T026435", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4.12" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.13.4", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.13.4", "product_id": "T028225", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.4" } } }, { "category": "product_version_range", "name": "Data Foundation \u003c4.13.0", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.13.0", "product_id": "T028289", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation_4.13.0" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.22", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.22", "product_id": "T028307", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.22" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.11.44", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.11.44", "product_id": "T028416", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.11.44" } } }, { "category": "product_version_range", "name": "Data Foundation \u003c4.12.10", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.12.10", "product_id": "T031698", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.0", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.0", "product_id": "T031839", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.46", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.46", "product_id": "T031870", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.46" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-20107", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2015-20107" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-16250", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-16250" }, { "cve": "CVE-2020-16251", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-16251" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-17049" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-3765", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-3765" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-4231", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4231" }, { "cve": "CVE-2021-4235", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4235" }, { "cve": "CVE-2021-4238", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4238" }, { "cve": "CVE-2021-43519", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-43519" }, { "cve": "CVE-2021-43998", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-43998" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44964", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44964" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0670", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-0670" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1304", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1348", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1348" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23540", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-23540" }, { "cve": "CVE-2022-23541", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-23541" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2509", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2509" }, { "cve": "CVE-2022-26280", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-26280" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-28805", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-28805" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3094" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32190", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-32190" }, { "cve": "CVE-2022-33099", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-33099" }, { "cve": "CVE-2022-3358", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3358" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-3715", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3715" }, { "cve": "CVE-2022-3736", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3736" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-38149", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-38149" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-3924", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3924" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-41316", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41316" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41723", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41723" }, { "cve": "CVE-2022-41724", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41724" }, { "cve": "CVE-2022-41725", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41725" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42919", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42919" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45873", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-45873" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-47024", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-47024" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-48303", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48303" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48338", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48338" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0361", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0361" }, { "cve": "CVE-2023-0620", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0620" }, { "cve": "CVE-2023-0665", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0665" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-2491", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-2491" }, { "cve": "CVE-2023-24999", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-24999" }, { "cve": "CVE-2023-25000", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-25000" }, { "cve": "CVE-2023-25136", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-25136" } ] }
WID-SEC-W-2022-0944
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat OpenShift Service Mesh ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0944 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0944.json" }, { "category": "self", "summary": "WID-SEC-2022-0944 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0944" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1486 vom 2023-03-28", "url": "https://access.redhat.com/errata/RHSA-2023:1486" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0593-1 vom 2023-03-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/013958.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1049 vom 2023-03-02", "url": "https://access.redhat.com/errata/RHSA-2023:1049" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1044 vom 2023-03-02", "url": "https://access.redhat.com/errata/RHSA-2023:1044" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1045 vom 2023-03-02", "url": "https://access.redhat.com/errata/RHSA-2023:1045" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1047 vom 2023-03-02", "url": "https://access.redhat.com/errata/RHSA-2023:1047" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1043 vom 2023-03-02", "url": "https://access.redhat.com/errata/RHSA-2023:1043" }, { "category": "external", "summary": "RedHat Security Advisory vom 2022-08-08", "url": "https://access.redhat.com/errata/RHSA-2022:5913" }, { "category": "external", "summary": "RedHat Security Advisory vom 2022-08-08", "url": "https://access.redhat.com/errata/RHSA-2022:5914" }, { "category": "external", "summary": "RedHat Security Advisory vom 2022-08-08", "url": "https://access.redhat.com/errata/RHSA-2022:5915" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5559-1 vom 2022-08-10", "url": "https://ubuntu.com/security/notices/USN-5559-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6156 vom 2022-08-24", "url": "https://access.redhat.com/errata/RHSA-2022:6156" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6271 vom 2022-08-31", "url": "https://access.redhat.com/errata/RHSA-2022:6271" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6272 vom 2022-08-31", "url": "https://access.redhat.com/errata/RHSA-2022:6272" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6277 vom 2022-09-01", "url": "https://access.redhat.com/errata/RHSA-2022:6277" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6345 vom 2022-09-06", "url": "https://access.redhat.com/errata/RHSA-2022:6345" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6370 vom 2022-09-07", "url": "https://access.redhat.com/errata/RHSA-2022:6370" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6393 vom 2022-09-08", "url": "https://access.redhat.com/errata/RHSA-2022:6393" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6392 vom 2022-09-08", "url": "https://access.redhat.com/errata/RHSA-2022:6392" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6422 vom 2022-09-13", "url": "https://access.redhat.com/errata/RHSA-2022:6422" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6507 vom 2022-09-14", "url": "https://access.redhat.com/errata/RHSA-2022:6507" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6696 vom 2022-09-26", "url": "https://access.redhat.com/errata/RHSA-2022:6696" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6813 vom 2022-10-05", "url": "https://access.redhat.com/errata/RHSA-2022:6813" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6835 vom 2022-10-06", "url": "https://access.redhat.com/errata/RHSA-2022:6835" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-20 vom 2022-10-26", "url": "https://www.tenable.com/security/tns-2022-20" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7276 vom 2022-11-02", "url": "https://access.redhat.com/errata/RHSA-2022:7276" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7313 vom 2022-11-02", "url": "https://access.redhat.com/errata/RHSA-2022:7313" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8652 vom 2022-11-28", "url": "https://access.redhat.com/errata/RHSA-2022:8652" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-28 vom 2022-12-19", "url": "https://www.tenable.com/security/tns-2022-28" } ], "source_lang": "en-US", "title": "Red Hat OpenShift Service Mesh: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2023-03-27T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:54:57.936+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0944", "initial_release_date": "2022-08-08T22:00:00.000+00:00", "revision_history": [ { "date": "2022-08-08T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-08-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-24T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-08-31T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-06T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-08T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-12T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-13T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-26T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-05T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-06T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2022-11-01T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-02T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-28T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2023-03-01T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-03-02T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-03-27T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "19" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 2.0", "product": { "name": "Red Hat OpenShift Service Mesh 2.0", "product_id": "T019393", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh_2.0" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 2.1", "product": { "name": "Red Hat OpenShift Service Mesh 2.1", "product_id": "T024194", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh_2.1" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 2.2", "product": { "name": "Red Hat OpenShift Service Mesh 2.2", "product_id": "T024195", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh_2.2" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Tenable Security Nessus \u003c 10.3.1", "product": { "name": "Tenable Security Nessus \u003c 10.3.1", "product_id": "T025130", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:10.3.1" } } }, { "category": "product_name", "name": "Tenable Security Nessus Network Monitor \u003c 6.2.0", "product": { "name": "Tenable Security Nessus Network Monitor \u003c 6.2.0", "product_id": "T025651", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:6.2.0" } } } ], "category": "vendor", "name": "Tenable Security" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Kiali for OpenShift Service Mesh Containers. Die Ursache dieses Problems ist eine ungen\u00fcgende \u00dcberpr\u00fcfung bereitgestellter Zeichenketten im Moment.js-Paket. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T024195", "T025130", "T024194", "T002207", "67646", "T000126", "T019393", "T025651" ] }, "release_date": "2022-08-08T22:00:00Z", "title": "CVE-2022-31129" } ] }
wid-sec-w-2023-1021
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1021 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1021.json" }, { "category": "self", "summary": "WID-SEC-2023-1021 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1021" }, { "category": "external", "summary": "IBM Security Bulletin 7008449 vom 2023-06-29", "url": "https://www.ibm.com/support/pages/node/7008449" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2023 - Appendix Oracle Communications vom 2023-04-18", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixCGBU" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-29T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:24:42.911+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1021", "initial_release_date": "2023-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM DB2", "product": { "name": "IBM DB2", "product_id": "5104", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Communications 9.1", "product": { "name": "Oracle Communications 9.1", "product_id": "T019868", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1" } } }, { "category": "product_name", "name": "Oracle Communications 3.3", "product": { "name": "Oracle Communications 3.3", "product_id": "T020687", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:3.3" } } }, { "category": "product_name", "name": "Oracle Communications 5.0", "product": { "name": "Oracle Communications 5.0", "product_id": "T021645", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.0" } } }, { "category": "product_name", "name": "Oracle Communications 12.6.0.0.0", "product": { "name": "Oracle Communications 12.6.0.0.0", "product_id": "T022818", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.6.0.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 7.0.0.0.0", "product": { "name": "Oracle Communications 7.0.0.0.0", "product_id": "T022823", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:7.0.0.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 8.6.0.0", "product": { "name": "Oracle Communications 8.6.0.0", "product_id": "T024970", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.6.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.0", "product": { "name": "Oracle Communications 22.3.0", "product_id": "T024974", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.1.0.0.0", "product": { "name": "Oracle Communications 22.1.0.0.0", "product_id": "T025863", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.0.0.0" } } }, { "category": "product_name", "name": "Oracle Communications \u003c= 22.4.4", "product": { "name": "Oracle Communications \u003c= 22.4.4", "product_id": "T027328", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.4.4" } } }, { "category": "product_name", "name": "Oracle Communications \u003c= 23.1.1", "product": { "name": "Oracle Communications \u003c= 23.1.1", "product_id": "T027329", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.1.1" } } }, { "category": "product_name", "name": "Oracle Communications 9.0.0", "product": { "name": "Oracle Communications 9.0.0", "product_id": "T027330", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 9.0.1", "product": { "name": "Oracle Communications 9.0.1", "product_id": "T027331", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.1" } } }, { "category": "product_name", "name": "Oracle Communications 9.1.1.4.0", "product": { "name": "Oracle Communications 9.1.1.4.0", "product_id": "T027332", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.1.4.0" } } }, { "category": "product_name", "name": "Oracle Communications 9.1.1.3.0", "product": { "name": "Oracle Communications 9.1.1.3.0", "product_id": "T027333", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.1.3.0" } } }, { "category": "product_name", "name": "Oracle Communications 9.0.1.6.0", "product": { "name": "Oracle Communications 9.0.1.6.0", "product_id": "T027334", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.1.6.0" } } }, { "category": "product_name", "name": "Oracle Communications 8.45", "product": { "name": "Oracle Communications 8.45", "product_id": "T027335", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.45" } } }, { "category": "product_name", "name": "Oracle Communications 9.15", "product": { "name": "Oracle Communications 9.15", "product_id": "T027336", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.15" } } }, { "category": "product_name", "name": "Oracle Communications 4.0", "product": { "name": "Oracle Communications 4.0", "product_id": "T027337", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.0" } } }, { "category": "product_name", "name": "Oracle Communications 12.6.1.0.0", "product": { "name": "Oracle Communications 12.6.1.0.0", "product_id": "T027338", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.6.1.0.0" } } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25613", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-25613" }, { "cve": "CVE-2023-25577", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-25577" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-23931", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-23931" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-0361", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-0361" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-45047", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-45047" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-43402", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-43402" }, { "cve": "CVE-2022-43401", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-43401" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-31630", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-31630" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-31123", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-31123" }, { "cve": "CVE-2022-28199", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-28199" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2021-37519", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027330", "T022818", "T020687", "T022823", "T024974", "T019868", "T021645", "5104", "T027337", "T024970", "T027338", "T027335", "T025863", "T027336", "T027333", "T027334", "T027331", "T027332" ], "last_affected": [ "T027328", "T027329" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-37519" } ] }
WID-SEC-W-2023-1350
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise in diversen Komponenten von Drittanbietern ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1350 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1350.json" }, { "category": "self", "summary": "WID-SEC-2023-1350 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1350" }, { "category": "external", "summary": "Splunk Enterprise Security Advisory SVD-2023-0613 vom 2023-06-01", "url": "https://advisory.splunk.com/advisories/SVD-2023-0613" }, { "category": "external", "summary": "IBM Security Bulletin 7008449 vom 2023-06-29", "url": "https://www.ibm.com/support/pages/node/7008449" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0487-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017931.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0486-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017932.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen in Komponenten von Drittanbietern", "tracking": { "current_release_date": "2024-02-15T23:00:00.000+00:00", "generator": { "date": "2024-02-16T09:06:57.360+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1350", "initial_release_date": "2023-06-01T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-01T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-02-15T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM DB2", "product": { "name": "IBM DB2", "product_id": "5104", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 8.1.14", "product": { "name": "Splunk Splunk Enterprise \u003c 8.1.14", "product_id": "T027935", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.1.14" } } }, { "category": "product_version_range", "name": "\u003c 8.2.11", "product": { "name": "Splunk Splunk Enterprise \u003c 8.2.11", "product_id": "T027936", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.11" } } }, { "category": "product_version_range", "name": "\u003c 9.0.5", "product": { "name": "Splunk Splunk Enterprise \u003c 9.0.5", "product_id": "T027937", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.5" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-4200", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-4200" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-37616", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37616" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-25858", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-25858" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-33587", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33587" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33502", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33502" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-27292", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-27292" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-23368", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23368" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-20095", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-20095" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8203", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8203" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8116", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8116" }, { "cve": "CVE-2020-7774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7774" }, { "cve": "CVE-2020-7753", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7753" }, { "cve": "CVE-2020-7662", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7662" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-15138", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-15138" }, { "cve": "CVE-2020-13822", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-13822" }, { "cve": "CVE-2019-20149", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-20149" }, { "cve": "CVE-2019-10746", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-10746" }, { "cve": "CVE-2019-10744", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-10744" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2017-16042", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2017-16042" } ] }
WID-SEC-W-2024-0528
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Data Protection Advisor ist eine Monitoring L\u00f6sung. Der Collector ist der lokale Agent.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell Data Protection Advisor ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Berechtigungen zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0528 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0528.json" }, { "category": "self", "summary": "WID-SEC-2024-0528 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0528" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-107 vom 2024-02-29", "url": "https://www.dell.com/support/kbdoc/000222618/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell Data Protection Advisor: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-29T23:00:00.000+00:00", "generator": { "date": "2024-03-01T12:07:07.687+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0528", "initial_release_date": "2024-02-29T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-29T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 19.10", "product": { "name": "Dell Data Protection Advisor \u003c 19.10", "product_id": "T033198", "product_identification_helper": { "cpe": "cpe:/a:dell:data_protection_advisor:19.10" } } } ], "category": "product_name", "name": "Data Protection Advisor" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45648", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-45648" }, { "cve": "CVE-2023-42795", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-42795" }, { "cve": "CVE-2023-41080", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-41080" }, { "cve": "CVE-2023-34055", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-34055" }, { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-28154", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-28154" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-22067", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-22067" }, { "cve": "CVE-2023-22025", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-22025" }, { "cve": "CVE-2023-20883", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-20883" }, { "cve": "CVE-2023-20873", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-20873" }, { "cve": "CVE-2023-20863", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-20863" }, { "cve": "CVE-2023-20861", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2023-20861" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-27772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-27772" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-25858", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-25858" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-22968", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-22968" }, { "cve": "CVE-2022-22965", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-22965" }, { "cve": "CVE-2022-22950", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2022-22950" }, { "cve": "CVE-2021-43980", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2021-43980" }, { "cve": "CVE-2021-33037", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2021-33037" }, { "cve": "CVE-2021-30640", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2021-30640" }, { "cve": "CVE-2020-5421", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-5421" }, { "cve": "CVE-2020-1938", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-1938" }, { "cve": "CVE-2020-1935", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-1935" }, { "cve": "CVE-2020-13943", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-13943" }, { "cve": "CVE-2020-13935", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-13935" }, { "cve": "CVE-2020-13934", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-13934" }, { "cve": "CVE-2020-11996", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2020-11996" }, { "cve": "CVE-2019-2684", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-2684" }, { "cve": "CVE-2019-17563", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-17563" }, { "cve": "CVE-2019-12418", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-12418" }, { "cve": "CVE-2019-10072", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-10072" }, { "cve": "CVE-2019-0232", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-0232" }, { "cve": "CVE-2019-0221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-0221" }, { "cve": "CVE-2019-0199", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2019-0199" }, { "cve": "CVE-2018-8037", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-8037" }, { "cve": "CVE-2018-8034", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-8034" }, { "cve": "CVE-2018-8014", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-8014" }, { "cve": "CVE-2018-15756", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-15756" }, { "cve": "CVE-2018-1336", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1336" }, { "cve": "CVE-2018-1305", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1305" }, { "cve": "CVE-2018-1304", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1304" }, { "cve": "CVE-2018-1275", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1275" }, { "cve": "CVE-2018-1272", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1272" }, { "cve": "CVE-2018-1271", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1271" }, { "cve": "CVE-2018-1270", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1270" }, { "cve": "CVE-2018-1257", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1257" }, { "cve": "CVE-2018-1199", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1199" }, { "cve": "CVE-2018-1196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-1196" }, { "cve": "CVE-2018-11784", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-11784" }, { "cve": "CVE-2018-11040", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-11040" }, { "cve": "CVE-2018-11039", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2018-11039" }, { "cve": "CVE-2017-8046", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-8046" }, { "cve": "CVE-2017-7675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-7675" }, { "cve": "CVE-2017-7674", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-7674" }, { "cve": "CVE-2017-5664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-5664" }, { "cve": "CVE-2017-5651", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-5651" }, { "cve": "CVE-2017-5650", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-5650" }, { "cve": "CVE-2017-5648", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-5648" }, { "cve": "CVE-2017-5647", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-5647" }, { "cve": "CVE-2017-18640", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-18640" }, { "cve": "CVE-2017-12617", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2017-12617" }, { "cve": "CVE-2016-9878", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2016-9878" }, { "cve": "CVE-2016-8745", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2016-8745" }, { "cve": "CVE-2016-8735", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2016-8735" }, { "cve": "CVE-2016-6817", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2016-6817" }, { "cve": "CVE-2016-6816", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Dell Data Protection Advisor. Diese Fehler bestehen in den Komponenten von Drittanbietern wie Apache Tomcat, Java SE oder Spring Framework und anderen aufgrund mehrerer sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Dateien zu manipulieren, vertrauliche Informationen offenzulegen, seine Rechte zu erweitern oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "release_date": "2024-02-29T23:00:00Z", "title": "CVE-2016-6816" } ] }
WID-SEC-W-2022-1476
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "SUSE Manager basiert auf Spacewalk, welche die Codebase vom Red Hat\r\nSatellite Server nutzt und erm\u00f6glicht ein zentrale Systemmanagement von Linux-Umgebungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen in SUSE Manager ausnutzen, um Sicherheitsvorkehrungen zu umgehen, beliebigen Code auszuf\u00fchren, seine Privilegien zu erweitern und einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1476 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1476.json" }, { "category": "self", "summary": "WID-SEC-2022-1476 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1476" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0593-1 vom 2023-03-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/013958.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012289.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012286.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012291.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3761-1 vom 2022-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012707.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3750-1 vom 2022-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" } ], "source_lang": "en-US", "title": "SUSE Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-03-02T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:58:46.451+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1476", "initial_release_date": "2022-09-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-03-02T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE Manager \u003c 4.2.9", "product": { "name": "SUSE Manager \u003c 4.2.9", "product_id": "T024662", "product_identification_helper": { "cpe": "cpe:/a:suse:manager:4.2.9" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41411", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in SUSE Manager. Der Fehler besteht in der Komponente drools aufgrund einer XML External Entity (XXE) Schwachstelle in KieModuleMarshaller.java. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T002207" ] }, "release_date": "2022-09-19T22:00:00Z", "title": "CVE-2021-41411" }, { "cve": "CVE-2021-42740", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in SUSE Manager. Der Fehler besteht in der Komponente Node.js aufgrund einer Befehlsinjektion. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er durch eine Regex, die f\u00fcr die Unterst\u00fctzung von Windows-Laufwerksbuchstaben entwickelt wurde, uneingescapte Shell-Metazeichen einf\u00fcgt, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207" ] }, "release_date": "2022-09-19T22:00:00Z", "title": "CVE-2021-42740" }, { "cve": "CVE-2021-43138", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in SUSE Manager. Der Fehler besteht in der Komponente Async in der mapValues()-Methode aufgrund einer Prototypenverschmutzung. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T002207" ] }, "release_date": "2022-09-19T22:00:00Z", "title": "CVE-2021-43138" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in SUSE Manager. Der Fehler besteht in der Komponente Moment aufgrund eines ineffizienten Parsing-Algorithmus. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er Eingaben mit mehr als 10k Zeichen \u00fcbermittelt, um einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T002207" ] }, "release_date": "2022-09-19T22:00:00Z", "title": "CVE-2022-31129" } ] }
WID-SEC-W-2023-1542
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1542 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1542.json" }, { "category": "self", "summary": "WID-SEC-2023-1542 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1542" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0139 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0139" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0143 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0143" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0137 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0137" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0121" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14", "url": "https://access.redhat.com/errata/RHSA-2023:7820" }, { "category": "external", "summary": "Meinberg Security Advisory", "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2024-01-lantime-firmware-v7-08-007.htm" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3742 vom 2023-06-22", "url": "https://access.redhat.com/errata/RHSA-2023:3742" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3612 vom 2023-06-23", "url": "https://access.redhat.com/errata/RHSA-2023:3614" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3615 vom 2023-06-22", "url": "https://access.redhat.com/errata/RHSA-2023:3615" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27", "url": "https://access.redhat.com/errata/RHSA-2023:3613" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2023-06-29", "url": "https://access.redhat.com/errata/RHSA-2023:3918" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3943 vom 2023-06-29", "url": "https://access.redhat.com/errata/RHSA-2023:3943" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3910 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3910" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3915 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3915" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3925 vom 2023-07-06", "url": "https://access.redhat.com/errata/RHSA-2023:3925" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4003 vom 2023-07-10", "url": "https://access.redhat.com/errata/RHSA-2023:4003" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-6CFE7492C1 vom 2023-07-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6cfe7492c1" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-AA7C75ED4A vom 2023-07-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-aa7c75ed4a" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4025 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4025" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4112 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4112" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4113 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4113" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4114 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4114" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4053" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4204 vom 2023-07-19", "url": "https://access.redhat.com/errata/RHSA-2023:4204" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4090 vom 2023-07-21", "url": "https://access.redhat.com/errata/RHSA-2023:4090" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4241 vom 2023-07-21", "url": "https://access.redhat.com/errata/RHSA-2023:4241" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4238 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4238" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4093 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4093" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4091 vom 2023-07-20", "url": "https://access.redhat.com/errata/RHSA-2023:4091" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4225 vom 2023-07-27", "url": "https://access.redhat.com/errata/RHSA-2023:4225" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4226 vom 2023-07-27", "url": "https://access.redhat.com/errata/RHSA-2023:4226" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4470 vom 2023-08-03", "url": "https://access.redhat.com/errata/RHSA-2023:4470" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4335 vom 2023-08-08", "url": "https://access.redhat.com/errata/RHSA-2023:4335" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4674 vom 2023-08-23", "url": "https://access.redhat.com/errata/RHSA-2023:4674" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4983 vom 2023-09-05", "url": "https://access.redhat.com/errata/RHSA-2023:4983" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5103 vom 2023-09-12", "url": "https://access.redhat.com/errata/RHSA-2023:5103" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5233 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5233" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5314 vom 2023-09-20", "url": "https://access.redhat.com/errata/RHSA-2023:5314" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30", "url": "https://access.redhat.com/errata/RHSA-2023:5006" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6316 vom 2023-11-07", "url": "https://access.redhat.com/errata/RHSA-2023:6316" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7058 vom 2023-11-15", "url": "https://access.redhat.com/errata/RHSA-2023:7058" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7823 vom 2024-01-05", "url": "https://access.redhat.com/errata/RHSA-2023:7823" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6939 vom 2023-11-21", "url": "https://linux.oracle.com/errata/ELSA-2023-6939.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-14A33318B8 vom 2023-12-03", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-14a33318b8" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7672 vom 2023-12-06", "url": "https://access.redhat.com/errata/RHSA-2023:7672" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-04 vom 2024-05-04", "url": "https://security.gentoo.org/glsa/202405-04" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2987" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3254 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3254" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T12:11:49.378+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1542", "initial_release_date": "2023-06-22T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-22T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-25T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-26T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-28T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-05T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-10T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-20T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-26T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-03T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-23T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-05T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-12T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-19T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-20T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-07T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-14T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-21T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-12-03T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2023-12-06T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-13T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-01T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-04T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-10T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Meinberg aufgenommen" }, { "date": "2024-05-05T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "32" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.08.007", "product": { "name": "Meinberg LANTIME \u003c7.08.007", "product_id": "T032435", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:7.08.007" } } } ], "category": "product_name", "name": "LANTIME" } ], "category": "vendor", "name": "Meinberg" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "Advanced Cluster Security for Kubernetes 4", "product": { "name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4", "product_id": "T027916", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4" } } }, { "category": "product_version", "name": "Service Interconnect 1", "product": { "name": "Red Hat Enterprise Linux Service Interconnect 1", "product_id": "T028472", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T008027", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } }, { "category": "product_version", "name": "Container Platform 4.12", "product": { "name": "Red Hat OpenShift Container Platform 4.12", "product_id": "T026435", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4.12" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.13.4", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.13.4", "product_id": "T028225", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.4" } } }, { "category": "product_version_range", "name": "Data Foundation \u003c4.13.0", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.13.0", "product_id": "T028289", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation_4.13.0" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.22", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.22", "product_id": "T028307", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.22" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.11.44", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.11.44", "product_id": "T028416", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.11.44" } } }, { "category": "product_version_range", "name": "Data Foundation \u003c4.12.10", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.12.10", "product_id": "T031698", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.0", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.0", "product_id": "T031839", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.12.46", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.46", "product_id": "T031870", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.46" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-20107", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2015-20107" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-16250", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-16250" }, { "cve": "CVE-2020-16251", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-16251" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2020-17049" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-3765", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-3765" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-4231", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4231" }, { "cve": "CVE-2021-4235", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4235" }, { "cve": "CVE-2021-4238", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-4238" }, { "cve": "CVE-2021-43519", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-43519" }, { "cve": "CVE-2021-43998", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-43998" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44964", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-44964" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0670", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-0670" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1304", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1348", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1348" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23540", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-23540" }, { "cve": "CVE-2022-23541", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-23541" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2509", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2509" }, { "cve": "CVE-2022-26280", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-26280" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-28805", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-28805" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3094" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32190", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-32190" }, { "cve": "CVE-2022-33099", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-33099" }, { "cve": "CVE-2022-3358", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3358" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-3715", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3715" }, { "cve": "CVE-2022-3736", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3736" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-38149", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-38149" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-3924", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-3924" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-41316", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41316" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41723", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41723" }, { "cve": "CVE-2022-41724", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41724" }, { "cve": "CVE-2022-41725", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-41725" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42919", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-42919" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45873", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-45873" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-47024", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-47024" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-48303", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48303" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48338", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48338" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0361", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0361" }, { "cve": "CVE-2023-0620", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0620" }, { "cve": "CVE-2023-0665", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-0665" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-2491", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-2491" }, { "cve": "CVE-2023-24999", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-24999" }, { "cve": "CVE-2023-25000", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-25000" }, { "cve": "CVE-2023-25136", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T032435", "T031698", "T008027", "T028472", "67646", "T012167", "T004914", "74185", "T031870", "T027916", "T028307", "T028416", "T026435", "T028225", "T031839" ] }, "release_date": "2023-06-22T22:00:00Z", "title": "CVE-2023-25136" } ] }
wid-sec-w-2022-1738
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1738 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1738.json" }, { "category": "self", "summary": "WID-SEC-2022-1738 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1738" }, { "category": "external", "summary": "IBM Security Bulletin 7038982 vom 2023-09-28", "url": "https://www.ibm.com/support/pages/node/7038982" }, { "category": "external", "summary": "IBM Security Bulletin: 6829353 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829353" }, { "category": "external", "summary": "IBM Security Bulletin: 6829371 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829371" }, { "category": "external", "summary": "IBM Security Bulletin: 6829373 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829373" }, { "category": "external", "summary": "IBM Security Bulletin: 6829335 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829335" }, { "category": "external", "summary": "IBM Security Bulletin: 6829311 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829311" }, { "category": "external", "summary": "IBM Security Bulletin: 6829369 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829369" }, { "category": "external", "summary": "IBM Security Bulletin: 6829325 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829325" }, { "category": "external", "summary": "IBM Security Bulletin: 6829365 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829365" }, { "category": "external", "summary": "IBM Security Bulletin: 6829361 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829361" }, { "category": "external", "summary": "IBM Security Bulletin: 6829339 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829339" }, { "category": "external", "summary": "IBM Security Bulletin: 6829349 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829349" }, { "category": "external", "summary": "IBM Security Bulletin: 6829363 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829363" }, { "category": "external", "summary": "IBM Security Bulletin: 6829327 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829327" }, { "category": "external", "summary": "IBM Security Bulletin 6955819 vom 2023-02-15", "url": "https://www.ibm.com/support/pages/node/6955819" } ], "source_lang": "en-US", "title": "IBM InfoSphere Information Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-09-27T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:00:50.645+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1738", "initial_release_date": "2022-10-16T22:00:00.000+00:00", "revision_history": [ { "date": "2022-10-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-03T23:00:00.000+00:00", "number": "2", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-02-15T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Information Server 11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } }, { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2009-0217" }, { "cve": "CVE-2009-2625", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2009-2625" }, { "cve": "CVE-2012-0881", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2012-0881" }, { "cve": "CVE-2012-2098", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2012-2098" }, { "cve": "CVE-2013-2172", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-2172" }, { "cve": "CVE-2013-4002", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-4002" }, { "cve": "CVE-2013-4517", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-4517" }, { "cve": "CVE-2015-4852", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-4852" }, { "cve": "CVE-2015-6420", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-6420" }, { "cve": "CVE-2015-7501", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-7501" }, { "cve": "CVE-2017-15708", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2017-15708" }, { "cve": "CVE-2019-13116", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2019-13116" }, { "cve": "CVE-2021-33813", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-33813" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-41089", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-41089" }, { "cve": "CVE-2021-41091", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-41091" }, { "cve": "CVE-2022-22442", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-22442" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-24769", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-24769" }, { "cve": "CVE-2022-30608", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-30608" }, { "cve": "CVE-2022-30615", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-30615" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-35642", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-35642" }, { "cve": "CVE-2022-35717", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-35717" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-40235", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-40235" }, { "cve": "CVE-2022-40747", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-40747" } ] }
wid-sec-w-2023-0809
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0809 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0809.json" }, { "category": "self", "summary": "WID-SEC-2023-0809 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0809" }, { "category": "external", "summary": "IBM Security Bulletin: 6967283 vom 2023-03-30", "url": "https://www.ibm.com/support/pages/node/6967283" }, { "category": "external", "summary": "IBM Security Bulletin: 6967333 vom 2023-03-30", "url": "https://www.ibm.com/support/pages/node/6967333" }, { "category": "external", "summary": "IBM Security Bulletin 6980799 vom 2023-04-04", "url": "https://www.ibm.com/support/pages/node/6980799" }, { "category": "external", "summary": "IBM Security Bulletin 7108657 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108657" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-5ECC250449 vom 2024-02-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5ecc250449" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-19T23:00:00.000+00:00", "generator": { "date": "2024-02-20T10:06:43.480+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0809", "initial_release_date": "2023-03-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-03-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-04T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Fedora aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } }, { "category": "product_version_range", "name": "\u003c User Behavior Analytics 4.1.11", "product": { "name": "IBM QRadar SIEM \u003c User Behavior Analytics 4.1.11", "product_id": "T027026", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:user_behavior_analytics_4.1.11" } } }, { "category": "product_version_range", "name": "\u003c 7.4.3 FP9", "product": { "name": "IBM QRadar SIEM \u003c 7.4.3 FP9", "product_id": "T027027", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.4.3_fp9" } } }, { "category": "product_version_range", "name": "\u003c 7.5.0 UP5", "product": { "name": "IBM QRadar SIEM \u003c 7.5.0 UP5", "product_id": "T027028", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up5" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2022-4883", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-4883" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-46363", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-46363" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-4254", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-4254" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41946", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-41946" }, { "cve": "CVE-2022-41704", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-41704" }, { "cve": "CVE-2022-40156", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40156" }, { "cve": "CVE-2022-40155", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40155" }, { "cve": "CVE-2022-40154", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40154" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37598", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-37598" }, { "cve": "CVE-2022-3676", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-3676" }, { "cve": "CVE-2022-36364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-36364" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34917", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-34917" }, { "cve": "CVE-2022-31197", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-31197" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-28733", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-28733" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-25927", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-25927" }, { "cve": "CVE-2022-25901", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-25901" }, { "cve": "CVE-2022-25758", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-25758" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-24839" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24785", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-24785" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-21724", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-21724" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-42740", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-42740" }, { "cve": "CVE-2021-42581", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-42581" }, { "cve": "CVE-2021-39227", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-39227" }, { "cve": "CVE-2021-3918", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-3918" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-3765", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-3765" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-26401", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-26401" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-23450", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23450" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-23368", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23368" }, { "cve": "CVE-2021-23364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23364" }, { "cve": "CVE-2021-23362", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23362" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2020-7764", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2020-7764" }, { "cve": "CVE-2020-5259", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2020-5259" }, { "cve": "CVE-2020-24025", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2020-24025" }, { "cve": "CVE-2020-15366", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2020-15366" }, { "cve": "CVE-2020-13936", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2020-13936" }, { "cve": "CVE-2019-6286", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2019-6286" }, { "cve": "CVE-2019-6284", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2019-6284" }, { "cve": "CVE-2019-6283", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2019-6283" }, { "cve": "CVE-2019-10785", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2019-10785" }, { "cve": "CVE-2018-8036", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-8036" }, { "cve": "CVE-2018-20821", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-20821" }, { "cve": "CVE-2018-20190", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-20190" }, { "cve": "CVE-2018-19839", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-19839" }, { "cve": "CVE-2018-19838", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-19838" }, { "cve": "CVE-2018-19827", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-19827" }, { "cve": "CVE-2018-19797", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-19797" }, { "cve": "CVE-2018-15494", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-15494" }, { "cve": "CVE-2018-11698", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-11698" }, { "cve": "CVE-2018-11694", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-11694" } ] }
WID-SEC-W-2023-0395
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0395 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0395.json" }, { "category": "self", "summary": "WID-SEC-2023-0395 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0395" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0215" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0214" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0213" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0212" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0211" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0210" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0209" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0208" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0207" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0206" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0205" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0204" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0203" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0202" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0201" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-02-14T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:14:35.515+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0395", "initial_release_date": "2023-02-14T23:00:00.000+00:00", "revision_history": [ { "date": "2023-02-14T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Splunk Splunk Enterprise \u003c 8.1.13", "product": { "name": "Splunk Splunk Enterprise \u003c 8.1.13", "product_id": "T026368", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.1.13" } } }, { "category": "product_name", "name": "Splunk Splunk Enterprise \u003c 8.2.10", "product": { "name": "Splunk Splunk Enterprise \u003c 8.2.10", "product_id": "T026369", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.10" } } }, { "category": "product_name", "name": "Splunk Splunk Enterprise \u003c 9.0.4", "product": { "name": "Splunk Splunk Enterprise \u003c 9.0.4", "product_id": "T026370", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.4" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-22943", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22943" }, { "cve": "CVE-2023-22942", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22942" }, { "cve": "CVE-2023-22941", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22941" }, { "cve": "CVE-2023-22940", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22940" }, { "cve": "CVE-2023-22939", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22939" }, { "cve": "CVE-2023-22938", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22938" }, { "cve": "CVE-2023-22937", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22937" }, { "cve": "CVE-2023-22936", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22936" }, { "cve": "CVE-2023-22935", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22935" }, { "cve": "CVE-2023-22934", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22934" }, { "cve": "CVE-2023-22933", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22933" }, { "cve": "CVE-2023-22932", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22932" }, { "cve": "CVE-2023-22931", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22931" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-32212", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2022-32212" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-24785", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2022-24785" }, { "cve": "CVE-2021-3537", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2021-3537" }, { "cve": "CVE-2021-3518", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2021-3518" }, { "cve": "CVE-2021-3517", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2021-3517" }, { "cve": "CVE-2021-28957", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2021-28957" }, { "cve": "CVE-2021-21419", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2021-21419" }, { "cve": "CVE-2015-20107", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2015-20107" } ] }
wid-sec-w-2023-0026
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Maximo Asset Management ist ein Enterprise-Asset-Management-System, das umfassenden Support f\u00fcr Assets, Maintenance, Ressourcen und Supply-Chain-Management-Anforderungen bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Maximo Asset Management ausnutzen, um Sicherheitsvorkehrungen zu umgehen und einen Denial-of-Service-Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0026 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0026.json" }, { "category": "self", "summary": "WID-SEC-2023-0026 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0026" }, { "category": "external", "summary": "IBM Security Bulletin 6956515 vom 2023-02-17", "url": "https://www.ibm.com/support/pages/node/6956515" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-01-04", "url": "https://www.ibm.com/support/pages/node/6852667" } ], "source_lang": "en-US", "title": "IBM Maximo Asset Management: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-02-19T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:08:36.695+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0026", "initial_release_date": "2023-01-04T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-04T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-02-19T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Maximo Asset Management 7.6.1.2", "product": { "name": "IBM Maximo Asset Management 7.6.1.2", "product_id": "T025744", "product_identification_helper": { "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.2" } } }, { "category": "product_name", "name": "IBM Maximo Asset Management 7.6.1.3", "product": { "name": "IBM Maximo Asset Management 7.6.1.3", "product_id": "T025745", "product_identification_helper": { "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.3" } } } ], "category": "product_name", "name": "Maximo Asset Management" }, { "category": "product_name", "name": "IBM Security Guardium Data Encryption \u003c 2.6.7", "product": { "name": "IBM Security Guardium Data Encryption \u003c 2.6.7", "product_id": "T026422", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:data_encryption__2.6.7" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM Maximo Asset Management. Der Fehler besteht in Moment.js, verursacht durch ineffiziente Komplexit\u00e4t regul\u00e4rer Ausdr\u00fccke. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er eine speziell gestaltete Anfrage sendet, um einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T025745", "T025744", "T026422" ] }, "release_date": "2023-01-04T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-24785", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM Maximo Asset Management. Der Fehler besteht in Moment.js aufgrund einer unsachgem\u00e4\u00dfen Validierung von Benutzereingaben, die zu einer Durchquerung von Verzeichnissen auf dem System f\u00fchrt. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er eine speziell erstellte Locale-Zeichenkette mit \"Punkt-Punkt\"-Sequenzen (/../) sendet, um die Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T025745", "T025744", "T026422" ] }, "release_date": "2023-01-04T23:00:00Z", "title": "CVE-2022-24785" } ] }
WID-SEC-W-2022-1738
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1738 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1738.json" }, { "category": "self", "summary": "WID-SEC-2022-1738 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1738" }, { "category": "external", "summary": "IBM Security Bulletin 7038982 vom 2023-09-28", "url": "https://www.ibm.com/support/pages/node/7038982" }, { "category": "external", "summary": "IBM Security Bulletin: 6829353 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829353" }, { "category": "external", "summary": "IBM Security Bulletin: 6829371 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829371" }, { "category": "external", "summary": "IBM Security Bulletin: 6829373 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829373" }, { "category": "external", "summary": "IBM Security Bulletin: 6829335 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829335" }, { "category": "external", "summary": "IBM Security Bulletin: 6829311 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829311" }, { "category": "external", "summary": "IBM Security Bulletin: 6829369 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829369" }, { "category": "external", "summary": "IBM Security Bulletin: 6829325 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829325" }, { "category": "external", "summary": "IBM Security Bulletin: 6829365 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829365" }, { "category": "external", "summary": "IBM Security Bulletin: 6829361 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829361" }, { "category": "external", "summary": "IBM Security Bulletin: 6829339 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829339" }, { "category": "external", "summary": "IBM Security Bulletin: 6829349 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829349" }, { "category": "external", "summary": "IBM Security Bulletin: 6829363 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829363" }, { "category": "external", "summary": "IBM Security Bulletin: 6829327 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829327" }, { "category": "external", "summary": "IBM Security Bulletin 6955819 vom 2023-02-15", "url": "https://www.ibm.com/support/pages/node/6955819" } ], "source_lang": "en-US", "title": "IBM InfoSphere Information Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-09-27T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:00:50.645+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1738", "initial_release_date": "2022-10-16T22:00:00.000+00:00", "revision_history": [ { "date": "2022-10-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-03T23:00:00.000+00:00", "number": "2", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-02-15T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Information Server 11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } }, { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2009-0217" }, { "cve": "CVE-2009-2625", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2009-2625" }, { "cve": "CVE-2012-0881", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2012-0881" }, { "cve": "CVE-2012-2098", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2012-2098" }, { "cve": "CVE-2013-2172", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-2172" }, { "cve": "CVE-2013-4002", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-4002" }, { "cve": "CVE-2013-4517", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-4517" }, { "cve": "CVE-2015-4852", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-4852" }, { "cve": "CVE-2015-6420", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-6420" }, { "cve": "CVE-2015-7501", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-7501" }, { "cve": "CVE-2017-15708", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2017-15708" }, { "cve": "CVE-2019-13116", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2019-13116" }, { "cve": "CVE-2021-33813", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-33813" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-41089", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-41089" }, { "cve": "CVE-2021-41091", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-41091" }, { "cve": "CVE-2022-22442", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-22442" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-24769", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-24769" }, { "cve": "CVE-2022-30608", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-30608" }, { "cve": "CVE-2022-30615", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-30615" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-35642", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-35642" }, { "cve": "CVE-2022-35717", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-35717" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-40235", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-40235" }, { "cve": "CVE-2022-40747", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-40747" } ] }
WID-SEC-W-2023-0809
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0809 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0809.json" }, { "category": "self", "summary": "WID-SEC-2023-0809 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0809" }, { "category": "external", "summary": "IBM Security Bulletin: 6967283 vom 2023-03-30", "url": "https://www.ibm.com/support/pages/node/6967283" }, { "category": "external", "summary": "IBM Security Bulletin: 6967333 vom 2023-03-30", "url": "https://www.ibm.com/support/pages/node/6967333" }, { "category": "external", "summary": "IBM Security Bulletin 6980799 vom 2023-04-04", "url": "https://www.ibm.com/support/pages/node/6980799" }, { "category": "external", "summary": "IBM Security Bulletin 7108657 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108657" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-5ECC250449 vom 2024-02-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5ecc250449" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-19T23:00:00.000+00:00", "generator": { "date": "2024-02-20T10:06:43.480+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0809", "initial_release_date": "2023-03-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-03-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-04T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Fedora aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } }, { "category": "product_version_range", "name": "\u003c User Behavior Analytics 4.1.11", "product": { "name": "IBM QRadar SIEM \u003c User Behavior Analytics 4.1.11", "product_id": "T027026", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:user_behavior_analytics_4.1.11" } } }, { "category": "product_version_range", "name": "\u003c 7.4.3 FP9", "product": { "name": "IBM QRadar SIEM \u003c 7.4.3 FP9", "product_id": "T027027", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.4.3_fp9" } } }, { "category": "product_version_range", "name": "\u003c 7.5.0 UP5", "product": { "name": "IBM QRadar SIEM \u003c 7.5.0 UP5", "product_id": "T027028", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up5" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2022-4883", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-4883" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-46363", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-46363" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-4254", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-4254" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41946", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-41946" }, { "cve": "CVE-2022-41704", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-41704" }, { "cve": "CVE-2022-40156", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40156" }, { "cve": "CVE-2022-40155", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40155" }, { "cve": "CVE-2022-40154", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40154" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37598", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-37598" }, { "cve": "CVE-2022-3676", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-3676" }, { "cve": "CVE-2022-36364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-36364" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34917", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-34917" }, { "cve": "CVE-2022-31197", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-31197" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-28733", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-28733" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-25927", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-25927" }, { "cve": "CVE-2022-25901", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-25901" }, { "cve": "CVE-2022-25758", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-25758" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-24839" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24785", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-24785" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-21724", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-21724" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-42740", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-42740" }, { "cve": "CVE-2021-42581", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-42581" }, { "cve": "CVE-2021-39227", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-39227" }, { "cve": "CVE-2021-3918", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-3918" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-3765", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-3765" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-26401", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-26401" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-23450", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23450" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-23368", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23368" }, { "cve": "CVE-2021-23364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23364" }, { "cve": "CVE-2021-23362", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23362" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2020-7764", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2020-7764" }, { "cve": "CVE-2020-5259", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2020-5259" }, { "cve": "CVE-2020-24025", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2020-24025" }, { "cve": "CVE-2020-15366", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2020-15366" }, { "cve": "CVE-2020-13936", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2020-13936" }, { "cve": "CVE-2019-6286", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2019-6286" }, { "cve": "CVE-2019-6284", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2019-6284" }, { "cve": "CVE-2019-6283", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2019-6283" }, { "cve": "CVE-2019-10785", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2019-10785" }, { "cve": "CVE-2018-8036", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-8036" }, { "cve": "CVE-2018-20821", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-20821" }, { "cve": "CVE-2018-20190", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-20190" }, { "cve": "CVE-2018-19839", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-19839" }, { "cve": "CVE-2018-19838", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-19838" }, { "cve": "CVE-2018-19827", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-19827" }, { "cve": "CVE-2018-19797", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-19797" }, { "cve": "CVE-2018-15494", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-15494" }, { "cve": "CVE-2018-11698", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-11698" }, { "cve": "CVE-2018-11694", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00Z", "title": "CVE-2018-11694" } ] }
wid-sec-w-2023-0125
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle PeopleSoft ist eine ERP Anwendung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle PeopleSoft ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0125 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0125.json" }, { "category": "self", "summary": "WID-SEC-2023-0125 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0125" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2023 - Appendix Oracle PeopleSoft vom 2023-01-17", "url": "https://www.oracle.com/security-alerts/cpujan2023.html#AppendixPS" } ], "source_lang": "en-US", "title": "Oracle PeopleSoft: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-01-17T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:10:18.526+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0125", "initial_release_date": "2023-01-17T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle PeopleSoft 8.58", "product": { "name": "Oracle PeopleSoft 8.58", "product_id": "T019029", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.58" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 9.2", "product": { "name": "Oracle PeopleSoft 9.2", "product_id": "T019030", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:9.2" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 8.59", "product": { "name": "Oracle PeopleSoft 8.59", "product_id": "T019905", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.59" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 8.60", "product": { "name": "Oracle PeopleSoft 8.60", "product_id": "T025008", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.60" } } } ], "category": "product_name", "name": "PeopleSoft" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21845", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2023-21845" }, { "cve": "CVE-2023-21844", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2023-21844" }, { "cve": "CVE-2023-21831", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2023-21831" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2021-3918", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2021-3918" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2020-10735" } ] }
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
wid-sec-w-2023-0395
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0395 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0395.json" }, { "category": "self", "summary": "WID-SEC-2023-0395 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0395" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0215" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0214" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0213" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0212" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0211" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0210" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0209" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0208" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0207" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0206" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0205" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0204" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0203" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0202" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-02-14", "url": "https://advisory.splunk.com//advisories/SVD-2023-0201" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-02-14T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:14:35.515+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0395", "initial_release_date": "2023-02-14T23:00:00.000+00:00", "revision_history": [ { "date": "2023-02-14T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Splunk Splunk Enterprise \u003c 8.1.13", "product": { "name": "Splunk Splunk Enterprise \u003c 8.1.13", "product_id": "T026368", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.1.13" } } }, { "category": "product_name", "name": "Splunk Splunk Enterprise \u003c 8.2.10", "product": { "name": "Splunk Splunk Enterprise \u003c 8.2.10", "product_id": "T026369", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.10" } } }, { "category": "product_name", "name": "Splunk Splunk Enterprise \u003c 9.0.4", "product": { "name": "Splunk Splunk Enterprise \u003c 9.0.4", "product_id": "T026370", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.4" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-22943", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22943" }, { "cve": "CVE-2023-22942", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22942" }, { "cve": "CVE-2023-22941", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22941" }, { "cve": "CVE-2023-22940", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22940" }, { "cve": "CVE-2023-22939", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22939" }, { "cve": "CVE-2023-22938", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22938" }, { "cve": "CVE-2023-22937", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22937" }, { "cve": "CVE-2023-22936", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22936" }, { "cve": "CVE-2023-22935", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22935" }, { "cve": "CVE-2023-22934", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22934" }, { "cve": "CVE-2023-22933", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22933" }, { "cve": "CVE-2023-22932", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22932" }, { "cve": "CVE-2023-22931", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2023-22931" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-32212", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2022-32212" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-24785", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2022-24785" }, { "cve": "CVE-2021-3537", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2021-3537" }, { "cve": "CVE-2021-3518", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2021-3518" }, { "cve": "CVE-2021-3517", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2021-3517" }, { "cve": "CVE-2021-28957", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2021-28957" }, { "cve": "CVE-2021-21419", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2021-21419" }, { "cve": "CVE-2015-20107", "notes": [ { "category": "description", "text": "In Splunk Splunk Enterprise existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten SPL Command Aliases, Daemon, REST Endpoint, Add-on Builder, CloudConnect SDK, Apache Commons Text, mehrere Third Party Packages, RSS Feeds, einer Ansicht, REST API Endpoint, einem Upload und einem Suchparameter. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, Daten zu manipulieren und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-02-14T23:00:00Z", "title": "CVE-2015-20107" } ] }
wid-sec-w-2022-2368
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "BigFix ist eine L\u00f6sung zum Erkennen und Verwalten von physischen und virtuellen Endpunkten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in HCL BigFix ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2368 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2368.json" }, { "category": "self", "summary": "WID-SEC-2022-2368 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2368" }, { "category": "external", "summary": "IBM Security Bulletin 6853623 vom 2023-01-09", "url": "https://www.ibm.com/support/pages/node/6853623" }, { "category": "external", "summary": "HCL Security Bulletin KB0102049 vom 2022-12-17", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0102049" }, { "category": "external", "summary": "HCL Security Bulletin vom 2022-12-19", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0102168" }, { "category": "external", "summary": "HCL Security Bulletin vom 2022-12-19", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0102140" } ], "source_lang": "en-US", "title": "HCL BigFix: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-01-09T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:07:21.053+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-2368", "initial_release_date": "2022-12-19T23:00:00.000+00:00", "revision_history": [ { "date": "2022-12-19T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-12-28T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2023-01-09T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "HCL BigFix", "product": { "name": "HCL BigFix", "product_id": "T017494", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:-" } } }, { "category": "product_name", "name": "HCL BigFix \u003c 10.0.8\u00a0", "product": { "name": "HCL BigFix \u003c 10.0.8\u00a0", "product_id": "T025721", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:10.0.8" } } }, { "category": "product_name", "name": "HCL BigFix \u003c 9.5.21", "product": { "name": "HCL BigFix \u003c 9.5.21", "product_id": "T025722", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:9.5.21" } } } ], "category": "product_name", "name": "BigFix" } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "category": "product_name", "name": "IBM License Metric Tool", "product": { "name": "IBM License Metric Tool", "product_id": "T016581", "product_identification_helper": { "cpe": "cpe:/a:ibm:license_metric_tool:-" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44756", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-44756" }, { "cve": "CVE-2022-42454", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-42454" }, { "cve": "CVE-2022-42448", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-42448" }, { "cve": "CVE-2022-39299", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-39299" }, { "cve": "CVE-2022-38655", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-38655" }, { "cve": "CVE-2022-37616", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-37616" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-31160", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-31160" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-25896", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-25896" }, { "cve": "CVE-2022-25887", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-25887" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-32014", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-32014" }, { "cve": "CVE-2021-32013", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-32013" }, { "cve": "CVE-2021-32012", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-32012" } ] }
WID-SEC-W-2023-2684
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Utilities Applications ist eine Produktfamilie mit branchenspezifischen L\u00f6sungen f\u00fcr Ver- und Entsorger.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Utilities Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2684 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2684.json" }, { "category": "self", "summary": "WID-SEC-2023-2684 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2684" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - October 2023 - Appendix Oracle Utilities Applications vom 2023-10-17", "url": "https://www.oracle.com/security-alerts/cpuoct2023.html#AppendixUTIL" } ], "source_lang": "en-US", "title": "Oracle Utilities Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-17T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:48:16.886+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2684", "initial_release_date": "2023-10-17T22:00:00.000+00:00", "revision_history": [ { "date": "2023-10-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Utilities Applications 4.2.0.3.0", "product": { "name": "Oracle Utilities Applications 4.2.0.3.0", "product_id": "T030619", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.2.0.3.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications \u003c= 4.3.0.6.0", "product": { "name": "Oracle Utilities Applications \u003c= 4.3.0.6.0", "product_id": "T030620", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.3.0.6.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.4.0.0.0", "product": { "name": "Oracle Utilities Applications 4.4.0.0.0", "product_id": "T030621", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.4.0.0.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.4.0.2.0", "product": { "name": "Oracle Utilities Applications 4.4.0.2.0", "product_id": "T030622", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.4.0.2.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.3.0.5.0", "product": { "name": "Oracle Utilities Applications 4.3.0.5.0", "product_id": "T030623", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.3.0.5.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.4.0.3.0", "product": { "name": "Oracle Utilities Applications 4.4.0.3.0", "product_id": "T030625", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.4.0.3.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.5.0.0.0", "product": { "name": "Oracle Utilities Applications 4.5.0.0.0", "product_id": "T030626", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.5.0.0.0" } } }, { "category": "product_name", "name": "Oracle Utilities Applications 4.5.0.0.1", "product": { "name": "Oracle Utilities Applications 4.5.0.0.1", "product_id": "T030627", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.5.0.0.1" } } }, { "category": "product_name", "name": "Oracle Utilities Applications \u003c= 4.5.0.1.2", "product": { "name": "Oracle Utilities Applications \u003c= 4.5.0.1.2", "product_id": "T030628", "product_identification_helper": { "cpe": "cpe:/a:oracle:utilities:4.5.0.1.2" } } } ], "category": "product_name", "name": "Utilities Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21829", "notes": [ { "category": "description", "text": "In Oracle Utilities Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T030622", "T030621", "T030623", "T030626", "T030625", "T030627", "T030619" ], "last_affected": [ "T030620", "T030628" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2023-21829" }, { "cve": "CVE-2022-42920", "notes": [ { "category": "description", "text": "In Oracle Utilities Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T030622", "T030621", "T030623", "T030626", "T030625", "T030627", "T030619" ], "last_affected": [ "T030620", "T030628" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2022-42920" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle Utilities Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T030622", "T030621", "T030623", "T030626", "T030625", "T030627", "T030619" ], "last_affected": [ "T030620", "T030628" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2022-31129" } ] }
WID-SEC-W-2022-2368
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "BigFix ist eine L\u00f6sung zum Erkennen und Verwalten von physischen und virtuellen Endpunkten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in HCL BigFix ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2368 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2368.json" }, { "category": "self", "summary": "WID-SEC-2022-2368 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2368" }, { "category": "external", "summary": "IBM Security Bulletin 6853623 vom 2023-01-09", "url": "https://www.ibm.com/support/pages/node/6853623" }, { "category": "external", "summary": "HCL Security Bulletin KB0102049 vom 2022-12-17", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0102049" }, { "category": "external", "summary": "HCL Security Bulletin vom 2022-12-19", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0102168" }, { "category": "external", "summary": "HCL Security Bulletin vom 2022-12-19", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0102140" } ], "source_lang": "en-US", "title": "HCL BigFix: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-01-09T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:07:21.053+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-2368", "initial_release_date": "2022-12-19T23:00:00.000+00:00", "revision_history": [ { "date": "2022-12-19T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-12-28T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2023-01-09T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "HCL BigFix", "product": { "name": "HCL BigFix", "product_id": "T017494", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:-" } } }, { "category": "product_name", "name": "HCL BigFix \u003c 10.0.8\u00a0", "product": { "name": "HCL BigFix \u003c 10.0.8\u00a0", "product_id": "T025721", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:10.0.8" } } }, { "category": "product_name", "name": "HCL BigFix \u003c 9.5.21", "product": { "name": "HCL BigFix \u003c 9.5.21", "product_id": "T025722", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:9.5.21" } } } ], "category": "product_name", "name": "BigFix" } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "category": "product_name", "name": "IBM License Metric Tool", "product": { "name": "IBM License Metric Tool", "product_id": "T016581", "product_identification_helper": { "cpe": "cpe:/a:ibm:license_metric_tool:-" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44756", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-44756" }, { "cve": "CVE-2022-42454", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-42454" }, { "cve": "CVE-2022-42448", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-42448" }, { "cve": "CVE-2022-39299", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-39299" }, { "cve": "CVE-2022-38655", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-38655" }, { "cve": "CVE-2022-37616", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-37616" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-31160", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-31160" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-25896", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-25896" }, { "cve": "CVE-2022-25887", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2022-25887" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-32014", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-32014" }, { "cve": "CVE-2021-32013", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-32013" }, { "cve": "CVE-2021-32012", "notes": [ { "category": "description", "text": "In HCL BigFix existieren mehrere Schwachstellen. Diese sind sowohl im Quellcode als auch in Open-Source-Komponenten zu finden. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit, die Vertraulichkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T016581", "T025722", "T025721", "T017494" ] }, "release_date": "2022-12-19T23:00:00Z", "title": "CVE-2021-32012" } ] }
WID-SEC-W-2023-0026
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Maximo Asset Management ist ein Enterprise-Asset-Management-System, das umfassenden Support f\u00fcr Assets, Maintenance, Ressourcen und Supply-Chain-Management-Anforderungen bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Maximo Asset Management ausnutzen, um Sicherheitsvorkehrungen zu umgehen und einen Denial-of-Service-Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0026 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0026.json" }, { "category": "self", "summary": "WID-SEC-2023-0026 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0026" }, { "category": "external", "summary": "IBM Security Bulletin 6956515 vom 2023-02-17", "url": "https://www.ibm.com/support/pages/node/6956515" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-01-04", "url": "https://www.ibm.com/support/pages/node/6852667" } ], "source_lang": "en-US", "title": "IBM Maximo Asset Management: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-02-19T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:08:36.695+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0026", "initial_release_date": "2023-01-04T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-04T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-02-19T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Maximo Asset Management 7.6.1.2", "product": { "name": "IBM Maximo Asset Management 7.6.1.2", "product_id": "T025744", "product_identification_helper": { "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.2" } } }, { "category": "product_name", "name": "IBM Maximo Asset Management 7.6.1.3", "product": { "name": "IBM Maximo Asset Management 7.6.1.3", "product_id": "T025745", "product_identification_helper": { "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.3" } } } ], "category": "product_name", "name": "Maximo Asset Management" }, { "category": "product_name", "name": "IBM Security Guardium Data Encryption \u003c 2.6.7", "product": { "name": "IBM Security Guardium Data Encryption \u003c 2.6.7", "product_id": "T026422", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:data_encryption__2.6.7" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM Maximo Asset Management. Der Fehler besteht in Moment.js, verursacht durch ineffiziente Komplexit\u00e4t regul\u00e4rer Ausdr\u00fccke. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er eine speziell gestaltete Anfrage sendet, um einen Denial-of-Service-Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "T025745", "T025744", "T026422" ] }, "release_date": "2023-01-04T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-24785", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM Maximo Asset Management. Der Fehler besteht in Moment.js aufgrund einer unsachgem\u00e4\u00dfen Validierung von Benutzereingaben, die zu einer Durchquerung von Verzeichnissen auf dem System f\u00fchrt. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er eine speziell erstellte Locale-Zeichenkette mit \"Punkt-Punkt\"-Sequenzen (/../) sendet, um die Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T025745", "T025744", "T026422" ] }, "release_date": "2023-01-04T23:00:00Z", "title": "CVE-2022-24785" } ] }
WID-SEC-W-2023-2229
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
wid-sec-w-2023-0137
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0137 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0137.json" }, { "category": "self", "summary": "WID-SEC-2023-0137 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0137" }, { "category": "external", "summary": "Hitachi Software Vulnerability Information hitachi-sec-2023-117 vom 2023-05-23", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-117/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 6963077 vom 2023-03-13", "url": "https://www.ibm.com/support/pages/node/6963077" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2023 - Appendix Oracle Communications vom 2023-01-17", "url": "https://www.oracle.com/security-alerts/cpujan2023.html#AppendixCGBU" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-22T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:10:37.081+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0137", "initial_release_date": "2023-01-17T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-03-13T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-05-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HITACHI aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Security Guardium 11.3", "product": { "name": "IBM Security Guardium 11.3", "product_id": "1048943", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.3" } } }, { "category": "product_name", "name": "IBM Security Guardium 11.5", "product": { "name": "IBM Security Guardium 11.5", "product_id": "T026399", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.5" } } } ], "category": "product_name", "name": "Security Guardium" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Communications 1.11.0", "product": { "name": "Oracle Communications 1.11.0", "product_id": "T020684", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:1.11.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.1.0", "product": { "name": "Oracle Communications 22.1.0", "product_id": "T022812", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.2.0", "product": { "name": "Oracle Communications 22.2.0", "product_id": "T023908", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.1.1", "product": { "name": "Oracle Communications 22.1.1", "product_id": "T023910", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.1" } } }, { "category": "product_name", "name": "Oracle Communications 22.2.1", "product": { "name": "Oracle Communications 22.2.1", "product_id": "T024969", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.1" } } }, { "category": "product_name", "name": "Oracle Communications 8.6.0.0", "product": { "name": "Oracle Communications 8.6.0.0", "product_id": "T024970", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.6.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.0", "product": { "name": "Oracle Communications 22.3.0", "product_id": "T024974", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.2.2", "product": { "name": "Oracle Communications 22.2.2", "product_id": "T024978", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.2" } } }, { "category": "product_name", "name": "Oracle Communications 22.2.3", "product": { "name": "Oracle Communications 22.2.3", "product_id": "T024979", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.3" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.1", "product": { "name": "Oracle Communications 22.3.1", "product_id": "T024980", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.1" } } }, { "category": "product_name", "name": "Oracle Communications \u003c= 22.4.0", "product": { "name": "Oracle Communications \u003c= 22.4.0", "product_id": "T024981", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.4.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.3", "product": { "name": "Oracle Communications 22.3.3", "product_id": "T025862", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.3" } } }, { "category": "product_name", "name": "Oracle Communications 22.1.0.0.0", "product": { "name": "Oracle Communications 22.1.0.0.0", "product_id": "T025863", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.1.0.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.2.4", "product": { "name": "Oracle Communications 22.2.4", "product_id": "T025864", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.2.4" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.2", "product": { "name": "Oracle Communications 22.3.2", "product_id": "T025865", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.2" } } }, { "category": "product_name", "name": "Oracle Communications 22.3.4", "product": { "name": "Oracle Communications 22.3.4", "product_id": "T025866", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.3.4" } } }, { "category": "product_name", "name": "Oracle Communications 7.1.0", "product": { "name": "Oracle Communications 7.1.0", "product_id": "T025867", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:7.1.0" } } }, { "category": "product_name", "name": "Oracle Communications 8.0.0", "product": { "name": "Oracle Communications 8.0.0", "product_id": "T025868", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 22.4.1", "product": { "name": "Oracle Communications 22.4.1", "product_id": "T025869", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.4.1" } } }, { "category": "product_name", "name": "Oracle Communications 22.0.0.0.0", "product": { "name": "Oracle Communications 22.0.0.0.0", "product_id": "T025870", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.0.0.0.0" } } }, { "category": "product_name", "name": "Oracle Communications 8.2.3.0", "product": { "name": "Oracle Communications 8.2.3.0", "product_id": "T025871", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.2.3.0" } } }, { "category": "product_name", "name": "Oracle Communications 10.4.0.4.1", "product": { "name": "Oracle Communications 10.4.0.4.1", "product_id": "T025872", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:10.4.0.4.1" } } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1273", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2018-1273" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2021-40528", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2021-40528" }, { "cve": "CVE-2022-0084", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-0084" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0934", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-0934" }, { "cve": "CVE-2022-1304", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1319", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-1319" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-2053", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-2053" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2509", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-2509" }, { "cve": "CVE-2022-2526", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-2526" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-27404", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-27404" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-30293", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-30293" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-31629", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-31629" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-34305", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-34305" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-4147", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-4147" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-43403", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-43403" }, { "cve": "CVE-2023-21890", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "1048943", "T023908", "T017562", "T024979", "T022812", "T024978", "T025869", "T020684", "T024969", "T025866", "T024974", "T025865", "T025868", "T023910", "T025867", "T025862", "T024970", "T025872", "T025864", "T025863", "T024980", "T025871", "T026399", "T025870" ], "last_affected": [ "T024981" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2023-21890" } ] }
WID-SEC-W-2023-0125
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle PeopleSoft ist eine ERP Anwendung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle PeopleSoft ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0125 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0125.json" }, { "category": "self", "summary": "WID-SEC-2023-0125 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0125" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2023 - Appendix Oracle PeopleSoft vom 2023-01-17", "url": "https://www.oracle.com/security-alerts/cpujan2023.html#AppendixPS" } ], "source_lang": "en-US", "title": "Oracle PeopleSoft: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-01-17T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:10:18.526+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0125", "initial_release_date": "2023-01-17T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle PeopleSoft 8.58", "product": { "name": "Oracle PeopleSoft 8.58", "product_id": "T019029", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.58" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 9.2", "product": { "name": "Oracle PeopleSoft 9.2", "product_id": "T019030", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:9.2" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 8.59", "product": { "name": "Oracle PeopleSoft 8.59", "product_id": "T019905", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.59" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 8.60", "product": { "name": "Oracle PeopleSoft 8.60", "product_id": "T025008", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.60" } } } ], "category": "product_name", "name": "PeopleSoft" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21845", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2023-21845" }, { "cve": "CVE-2023-21844", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2023-21844" }, { "cve": "CVE-2023-21831", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2023-21831" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2021-3918", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2021-3918" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2020-10735" } ] }
ghsa-wc69-rhjr-hc9g
Vulnerability from github
Impact
- using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs
- noticeable slowdown is observed with inputs above 10k characters
- users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks
Patches
The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking.
Workarounds
In general, given the proliferation of ReDoS attacks, it makes sense to limit the length of the user input to something sane, like 200 characters or less. I haven't seen legitimate cases of date-time strings longer than that, so all moment users who do pass a user-originating string to constructor are encouraged to apply such a rudimentary filter, that would help with this but also most future ReDoS vulnerabilities.
References
There is an excellent writeup of the issue here: https://github.com/moment/moment/pull/6015#issuecomment-1152961973=
Details
The issue is rooted in the code that removes legacy comments (stuff inside parenthesis) from strings during rfc2822 parsing. moment("(".repeat(500000))
will take a few minutes to process, which is unacceptable.
{ "affected": [ { "ecosystem_specific": { "affected_functions": [ "(moment)" ] }, "package": { "ecosystem": "npm", "name": "moment" }, "ranges": [ { "events": [ { "introduced": "2.18.0" }, { "fixed": "2.29.4" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Moment.js" }, "ranges": [ { "events": [ { "introduced": "2.18.0" }, { "fixed": "2.29.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-31129" ], "database_specific": { "cwe_ids": [ "CWE-1333", "CWE-400" ], "github_reviewed": true, "github_reviewed_at": "2022-07-06T18:38:49Z", "nvd_published_at": "2022-07-06T18:15:00Z", "severity": "HIGH" }, "details": "### Impact\n\n* using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs\n* noticeable slowdown is observed with inputs above 10k characters\n* users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks\n\n### Patches\nThe problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking.\n\n### Workarounds\nIn general, given the proliferation of ReDoS attacks, it makes sense to limit the length of the user input to something sane, like 200 characters or less. I haven\u0027t seen legitimate cases of date-time strings longer than that, so all moment users who do pass a user-originating string to constructor are encouraged to apply such a rudimentary filter, that would help with this but also most future ReDoS vulnerabilities.\n\n### References\nThere is an excellent writeup of the issue here: https://github.com/moment/moment/pull/6015#issuecomment-1152961973=\n\n### Details\nThe issue is rooted in the code that removes legacy comments (stuff inside parenthesis) from strings during rfc2822 parsing. `moment(\"(\".repeat(500000))` will take a few minutes to process, which is unacceptable.", "id": "GHSA-wc69-rhjr-hc9g", "modified": "2022-09-14T19:29:44Z", "published": "2022-07-06T18:38:49Z", "references": [ { "type": "WEB", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "type": "WEB", "url": "https://github.com/moment/moment/pull/6015#issuecomment-1152961973" }, { "type": "WEB", "url": "https://github.com/moment/moment/pull/6015/commits/4bbb9f3ccbe231de40207503f344fe5ce97584f4" }, { "type": "WEB", "url": "https://github.com/moment/moment/pull/6015/commits/bfd4f2375d5c1a2106246721d693a9611dddfbfe" }, { "type": "WEB", "url": "https://github.com/moment/moment/pull/6015/commits/dc0d180e90d8a84f7ff13572363330a22b3ea504" }, { "type": "WEB", "url": "https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3" }, { "type": "PACKAGE", "url": "https://github.com/moment/moment" }, { "type": "WEB", "url": "https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWY24RJA3SBJGA5N4CU4VBPHJPPPJL5O" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZMX5YHELQVCGKKQVFXIYOTBMN23YYSRO" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20221014-0003" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "Moment.js vulnerable to Inefficient Regular Expression Complexity" }
gsd-2022-31129
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-31129", "description": "moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.", "id": "GSD-2022-31129", "references": [ "https://access.redhat.com/errata/RHSA-2022:5913", "https://access.redhat.com/errata/RHSA-2022:5914", "https://access.redhat.com/errata/RHSA-2022:5915", "https://ubuntu.com/security/CVE-2022-31129", "https://access.redhat.com/errata/RHSA-2022:6156", "https://access.redhat.com/errata/RHSA-2022:6271", "https://access.redhat.com/errata/RHSA-2022:6272", "https://access.redhat.com/errata/RHSA-2022:6277", "https://advisories.mageia.org/CVE-2022-31129.html", "https://access.redhat.com/errata/RHSA-2022:6345", "https://access.redhat.com/errata/RHSA-2022:6370", "https://access.redhat.com/errata/RHSA-2022:6392", "https://access.redhat.com/errata/RHSA-2022:6393", "https://access.redhat.com/errata/RHSA-2022:6422", "https://access.redhat.com/errata/RHSA-2022:6507", "https://access.redhat.com/errata/RHSA-2022:6835", "https://access.redhat.com/errata/RHSA-2022:7055", "https://access.redhat.com/errata/RHSA-2022:7313", "https://access.redhat.com/errata/RHSA-2022:8652", "https://www.suse.com/security/cve/CVE-2022-31129.html", "https://access.redhat.com/errata/RHSA-2023:1043", "https://access.redhat.com/errata/RHSA-2023:1044", "https://access.redhat.com/errata/RHSA-2023:1045", "https://access.redhat.com/errata/RHSA-2023:1047", "https://access.redhat.com/errata/RHSA-2023:1049", "https://access.redhat.com/errata/RHSA-2022:6813" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-31129" ], "details": "moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.", "id": "GSD-2022-31129", "modified": "2023-12-13T01:19:17.496613Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31129", "STATE": "PUBLIC", "TITLE": "Inefficient Regular Expression Complexity in moment" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "moment", "version": { "version_data": [ { "version_value": " \u003e= 2.18.0, \u003c 2.29.4" } ] } } ] }, "vendor_name": "moment" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "refsource": "CONFIRM", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" }, { "name": "https://github.com/moment/moment/pull/6015#issuecomment-1152961973", "refsource": "MISC", "url": "https://github.com/moment/moment/pull/6015#issuecomment-1152961973" }, { "name": "https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3", "refsource": "MISC", "url": "https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3" }, { "name": "https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/", "refsource": "MISC", "url": "https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/" }, { "name": "FEDORA-2022-85aa8e5706", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/" }, { "name": "FEDORA-2022-35b698150c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/" }, { "name": "FEDORA-2022-b9ef7c3c3c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWY24RJA3SBJGA5N4CU4VBPHJPPPJL5O/" }, { "name": "FEDORA-2022-798fd95813", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZMX5YHELQVCGKKQVFXIYOTBMN23YYSRO/" }, { "name": "https://security.netapp.com/advisory/ntap-20221014-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20221014-0003/" }, { "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3295-1] node-moment security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html" } ] }, "source": { "advisory": "GHSA-wc69-rhjr-hc9g", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=2.18.0 \u003c2.29.4", "affected_versions": "All versions starting from 2.18.0 before 2.29.4", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-1333", "CWE-937" ], "date": "2023-07-24", "description": "moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor is vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.", "fixed_versions": [ "2.29.4" ], "identifier": "CVE-2022-31129", "identifiers": [ "CVE-2022-31129", "GHSA-wc69-rhjr-hc9g" ], "not_impacted": "All versions before 2.18.0, all versions starting from 2.29.4", "package_slug": "npm/moment", "pubdate": "2022-07-06", "solution": "Upgrade to version 2.29.4 or above.", "title": "Inefficient Regular Expression Complexity", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3", "https://github.com/moment/moment/pull/6015#issuecomment-1152961973", "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/" ], "uuid": "0362fa68-1498-4a73-8364-42bdd71d3237" }, { "affected_range": "[2.18.0,2.29.4)", "affected_versions": "All versions starting from 2.18.0 before 2.29.4", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-400", "CWE-937" ], "date": "2022-07-25", "description": "moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor is vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.", "fixed_versions": [ "2.29.4" ], "identifier": "CVE-2022-31129", "identifiers": [ "GHSA-wc69-rhjr-hc9g", "CVE-2022-31129" ], "not_impacted": "All versions before 2.18.0, all versions starting from 2.29.4", "package_slug": "nuget/Moment.js", "pubdate": "2022-07-06", "solution": "Upgrade to version 2.29.4 or above.", "title": "Uncontrolled Resource Consumption", "urls": [ "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "https://github.com/moment/moment/pull/6015#issuecomment-1152961973", "https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3", "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/", "https://github.com/advisories/GHSA-wc69-rhjr-hc9g" ], "uuid": "e444aee9-7dc4-45ac-9203-c8a85a4ee897" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:momentjs:moment:*:*:*:*:*:nuget:*:*", "cpe_name": [], "versionEndExcluding": "2.29.4", "versionStartIncluding": "2.18.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:momentjs:moment:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "2.29.4", "versionStartIncluding": "2.18.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31129" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-1333" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/moment/moment/commit/9a3b5894f3d5d602948ac8a02e4ee528a49ca3a3" }, { "name": "https://github.com/moment/moment/pull/6015#issuecomment-1152961973", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/moment/moment/pull/6015#issuecomment-1152961973" }, { "name": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" }, { "name": "https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/" }, { "name": "FEDORA-2022-85aa8e5706", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/" }, { "name": "FEDORA-2022-35b698150c", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/" }, { "name": "FEDORA-2022-b9ef7c3c3c", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWY24RJA3SBJGA5N4CU4VBPHJPPPJL5O/" }, { "name": "FEDORA-2022-798fd95813", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZMX5YHELQVCGKKQVFXIYOTBMN23YYSRO/" }, { "name": "https://security.netapp.com/advisory/ntap-20221014-0003/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0003/" }, { "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3295-1] node-moment security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-07-24T13:16Z", "publishedDate": "2022-07-06T18:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.